CVE-2021-29619 – Segfault in `tf.raw_ops.SparseCountSparseOutput`
https://notcve.org/view.php?id=CVE-2021-29619
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. TensorFlow es una plataforma de código abierto de extremo a extremo para el aprendizaje automático. • https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9 https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wvjw-p9f5-vq28 • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2021-29587 – Division by zero in TFLite's implementation of `SpaceToDepth`
https://notcve.org/view.php?id=CVE-2021-29587
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step of the `SpaceToDepth` TFLite operator does not check for 0 before division(https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67). An attacker can craft a model such that `params->block_size` would be zero. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. • https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7 https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g • CWE-369: Divide By Zero •
CVE-2021-29588 – Division by zero in TFLite's implementation of `TransposeConv`
https://notcve.org/view.php?id=CVE-2021-29588
TensorFlow is an end-to-end open source platform for machine learning. The optimized implementation of the `TransposeConv` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L5221-L5222). An attacker can craft a model such that `stride_{h,w}` values are 0. Code calling this function must validate these arguments. The fix will be included in TensorFlow 2.5.0. • https://github.com/tensorflow/tensorflow/commit/801c1c6be5324219689c98e1bd3e0ca365ee834d https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vfr4-x8j2-3rf9 • CWE-369: Divide By Zero •
CVE-2021-29589 – Division by zero in TFLite's implementation of `GatherNd`
https://notcve.org/view.php?id=CVE-2021-29589
TensorFlow is an end-to-end open source platform for machine learning. The reference implementation of the `GatherNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966). An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension. The fix will be included in TensorFlow 2.5.0. • https://github.com/tensorflow/tensorflow/commit/8e45822aa0b9f5df4b4c64f221e64dc930a70a9d https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3w67-q784-6w7c • CWE-369: Divide By Zero •
CVE-2021-29590 – Heap OOB read in TFLite's implementation of `Minimum` or `Maximum`
https://notcve.org/view.php?id=CVE-2021-29590
TensorFlow is an end-to-end open source platform for machine learning. The implementations of the `Minimum` and `Maximum` TFLite operators can be used to read data outside of bounds of heap allocated objects, if any of the two input tensor arguments are empty. This is because the broadcasting implementation(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/maximum_minimum.h#L52-L56) indexes in both tensors with the same index but does not validate that the index is within bounds. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. • https://github.com/tensorflow/tensorflow/commit/953f28dca13c92839ba389c055587cfe6c723578 https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x6-8c7m-hv3f • CWE-125: Out-of-bounds Read •