製品・ソフトウェアに関する情報
TensorFlow におけるゼロ除算に関する脆弱性
Title TensorFlow におけるゼロ除算に関する脆弱性
Summary

TensorFlow には、ゼロ除算に関する脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date April 20, 2021, midnight
Registration Date Jan. 21, 2022, 5:52 p.m.
Last Update Jan. 21, 2022, 5:52 p.m.
CVSS3.0 : 警告
Score 5.5
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS2.0 : 注意
Score 2.1
Vector AV:L/AC:L/Au:N/C:N/I:N/A:P
Affected System
Google
Google TensorFlow 2.5.0 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2022年01月21日]
  掲載
Jan. 21, 2022, 5:52 p.m.

NVD Vulnerability Information
CVE-2021-29527
Summary

TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L259) does a division by a quantity that is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Publication Date May 15, 2021, 5:15 a.m.
Registration Date May 15, 2021, 10 a.m.
Last Update May 21, 2021, 12:47 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.1.4
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.2.0 2.2.3
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.3.0 2.3.3
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.4.0 2.4.2
Related information, measures and tools
Common Vulnerabilities List