Learn about CVE-2021-29589, a vulnerability in TensorFlow's TFLite `GatherNd` operator triggering division by zero. Impact, affected versions, and mitigation steps provided.
TensorFlow is an end-to-end open source platform for machine learning. The vulnerability in the
GatherNd
TFLite operator allows an attacker to trigger a division by zero error. This issue affects TensorFlow versions prior to 2.1.4, between 2.2.0 and 2.2.3, 2.3.0 and 2.3.3, as well as 2.4.0 and 2.4.2. The impact of this vulnerability is rated as low with a CVSS base score of 2.5.
Understanding CVE-2021-29589
This section will cover what CVE-2021-29589 entails, its impact, technical details, and how to mitigate the risk.
What is CVE-2021-29589?
CVE-2021-29589 highlights a vulnerability in TensorFlow's TFLite
GatherNd
operator that enables potential attackers to cause a division by zero error, impacting the overall security of TensorFlow versions.
The Impact of CVE-2021-29589
The impact of this vulnerability is considered low, with an overall CVSS base score of 2.5. However, it poses a risk to affected TensorFlow versions, potentially enabling attackers to exploit the issue.
Technical Details of CVE-2021-29589
This section outlines the specifics of the vulnerability, including its description, affected systems and versions, and the exploitation mechanism.
Vulnerability Description
The vulnerability arises from the
GatherNd
TFLite operator, allowing attackers to trigger a division by zero error.
Affected Systems and Versions
TensorFlow versions below 2.1.4, between 2.2.0 and 2.2.3, 2.3.0 and 2.3.3, as well as 2.4.0 and 2.4.2 are affected by this vulnerability.
Exploitation Mechanism
Attackers can exploit this vulnerability by crafting a model that results in an empty tensor as an input to the
params
parameter, leading to a division by zero error.
Mitigation and Prevention
This section provides guidance on how to address and prevent the risks associated with CVE-2021-29589.
Immediate Steps to Take
As an immediate measure, users are advised to update their TensorFlow installations to version 2.5.0 or apply the appropriate patches for TensorFlow versions 2.4.2, 2.3.3, 2.2.3, and 2.1.4.
Long-Term Security Practices
In the long term, it is crucial to regularly update TensorFlow to the latest secure versions and stay informed about security advisories and patches.
Patching and Updates
Ensure that your TensorFlow environment is kept up to date with the latest security patches and updates to mitigate the risks associated with CVE-2021-29589.