CVE-2021-29522

Source
https://cve.org/CVERecord?id=CVE-2021-29522
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-29522.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-29522
Aliases
Related
Published
2021-05-14T20:15:11.617Z
Modified
2026-02-03T07:23:45.683376Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

TensorFlow is an end-to-end open source platform for machine learning. The tf.raw_ops.Conv3DBackprop* operations fail to validate that the input tensors are not empty. In turn, this would result in a division by 0. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/a91bb59769f19146d5a0c20060244378e878f140/tensorflow/core/kernels/convgradops_3d.cc#L430-L450) does not check that the divisor used in computing the shard size is not zero. Thus, if attacker controls the input sizes, they can trigger a denial of service via a division by zero error. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

References

Affected packages

Git / github.com/tensorflow/tensorflow

Database specific

vanir_signatures
[
    {
        "signature_type": "Line",
        "source": "https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa",
        "target": {
            "file": "tensorflow/core/kernels/conv_grad_ops_3d.cc"
        },
        "id": "CVE-2021-29522-4e7291f4",
        "signature_version": "v1",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "59841844848758666086908188742021283632",
                "227479357852026882927339681456364555518",
                "244415961008675039405868826138846578339",
                "59841844848758666086908188742021283632",
                "227479357852026882927339681456364555518",
                "244415961008675039405868826138846578339",
                "196903370046018019619532256527991149807",
                "259268301063663699858421911676945756909",
                "79212091227822515891043225336983937806",
                "276595474107124887196132802646259851567",
                "89415597940092275213997775940848975108",
                "244415961008675039405868826138846578339",
                "276595474107124887196132802646259851567",
                "89415597940092275213997775940848975108",
                "244415961008675039405868826138846578339",
                "6090327441426760783076494680181792993",
                "306973991094784158649349922105564178668",
                "300023463893846436219088151219494024674"
            ]
        },
        "deprecated": false
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-29522.json"