From 8df582ba8ef8d0694c8c05c2cd1efda02aba8448 Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Fri, 14 May 2021 13:18:21 -0600 Subject: [PATCH] Add CVE-2021-29605 for GHSA-jf7h-7m85-w2v2 --- 2021/29xxx/CVE-2021-29605.json | 91 +++++++++++++++++++++++++++++++--- 1 file changed, 85 insertions(+), 6 deletions(-) diff --git a/2021/29xxx/CVE-2021-29605.json b/2021/29xxx/CVE-2021-29605.json index e139bb850c8..959de6436d6 100644 --- a/2021/29xxx/CVE-2021-29605.json +++ b/2021/29xxx/CVE-2021-29605.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-29605", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Integer overflow in TFLite memory allocation" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "tensorflow", + "version": { + "version_data": [ + { + "version_value": "< 2.1.4" + }, + { + "version_value": ">= 2.2.0, < 2.2.3" + }, + { + "version_value": ">= 2.3.0, < 2.3.3" + }, + { + "version_value": ">= 2.4.0, < 2.4.2" + } + ] + } + } + ] + }, + "vendor_name": "tensorflow" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TensorFlow is an end-to-end open source platform for machine learning. The TFLite code for allocating `TFLiteIntArray`s is vulnerable to an integer overflow issue(https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L24-L27). An attacker can craft a model such that the `size` multiplier is so large that the return value overflows the `int` datatype and becomes negative. In turn, this results in invalid value being given to `malloc`(https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L47-L52). In this case, `ret->size` would dereference an invalid pointer. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-190: Integer Overflow or Wraparound" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2", + "refsource": "CONFIRM", + "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2" + }, + { + "name": "https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5", + "refsource": "MISC", + "url": "https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5" + } + ] + }, + "source": { + "advisory": "GHSA-jf7h-7m85-w2v2", + "discovery": "UNKNOWN" } } \ No newline at end of file