TensorFlow におけるゼロ除算に関する脆弱性
Title |
TensorFlow におけるゼロ除算に関する脆弱性 |
Summary |
TensorFlow には、ゼロ除算に関する脆弱性が存在します。
|
Possible impacts |
サービス運用妨害 (DoS) 状態にされる可能性があります。 |
Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
Publication Date |
April 20, 2021, midnight |
Registration Date |
Jan. 21, 2022, 5:52 p.m. |
Last Update |
Jan. 21, 2022, 5:52 p.m. |
CVSS3.0 : 警告
|
Score |
5.5
|
Vector |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
CVSS2.0 : 注意
|
Score |
2.1
|
Vector |
AV:L/AC:L/Au:N/C:N/I:N/A:P |
Affected System
Google |
Google TensorFlow 2.5.0 未満
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No |
Changed Details |
Date of change |
1 |
[2022年01月21日] 掲載 |
Jan. 21, 2022, 5:52 p.m. |
NVD Vulnerability Information
CVE-2021-29527
Summary |
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L259) does a division by a quantity that is controlled by the caller. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
Publication Date |
May 15, 2021, 5:15 a.m. |
Registration Date |
May 15, 2021, 10 a.m. |
Last Update |
May 21, 2021, 12:47 a.m. |
Affected software configurations
Configuration1 |
or higher |
or less |
more than |
less than |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* |
|
|
|
2.1.4 |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* |
2.2.0 |
|
|
2.2.3 |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* |
2.3.0 |
|
|
2.3.3 |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* |
2.4.0 |
|
|
2.4.2 |
Related information, measures and tools
Common Vulnerabilities List