From b9546a7ac239f31185c81580bb0d3f3a7d1bc54a Mon Sep 17 00:00:00 2001 From: Robert Schultheis Date: Fri, 14 May 2021 13:10:12 -0600 Subject: [PATCH] Add CVE-2021-29556 for GHSA-fxqh-cfjm-fp93 --- 2021/29xxx/CVE-2021-29556.json | 91 +++++++++++++++++++++++++++++++--- 1 file changed, 85 insertions(+), 6 deletions(-) diff --git a/2021/29xxx/CVE-2021-29556.json b/2021/29xxx/CVE-2021-29556.json index 39cd3cf12fe..db95a56db0e 100644 --- a/2021/29xxx/CVE-2021-29556.json +++ b/2021/29xxx/CVE-2021-29556.json @@ -1,18 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-29556", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Division by 0 in `Reverse`" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "tensorflow", + "version": { + "version_data": [ + { + "version_value": "< 2.1.4" + }, + { + "version_value": ">= 2.2.0, < 2.2.3" + }, + { + "version_value": ">= 2.3.0, < 2.3.3" + }, + { + "version_value": ">= 2.4.0, < 2.4.2" + } + ] + } + } + ] + }, + "vendor_name": "tensorflow" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.Reverse`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/36229ea9e9451dac14a8b1f4711c435a1d84a594/tensorflow/core/kernels/reverse_op.cc#L75-L76) performs a division based on the first dimension of the tensor argument. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range." } ] + }, + "impact": { + "cvss": { + "attackComplexity": "HIGH", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 2.5, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-369: Divide By Zero" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxqh-cfjm-fp93", + "refsource": "CONFIRM", + "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxqh-cfjm-fp93" + }, + { + "name": "https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1", + "refsource": "MISC", + "url": "https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1" + } + ] + }, + "source": { + "advisory": "GHSA-fxqh-cfjm-fp93", + "discovery": "UNKNOWN" } } \ No newline at end of file