CVE-2021-29531 (CNNVD-202105-939)
中文标题:
Google TensorFlow 代码问题漏洞
英文标题:
CHECK-fail in tf.raw_ops.EncodePng
漏洞描述
中文描述:
Google TensorFlow是美国谷歌(Google)公司的一套用于机器学习的端到端开源平台。 TensorFlow 2.4.2,2.3.3,2.2.3,2.1.4存在代码问题漏洞,攻击者可利用该漏洞可以通过利用来自实现CHECK失败来导致拒绝服务。
英文描述:
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a `CHECK` fail in PNG encoding by providing an empty input tensor as the pixel data. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L57-L60) only validates that the total number of pixels in the image does not overflow. Thus, an attacker can send an empty matrix for encoding. However, if the tensor is empty, then the associated buffer is `nullptr`. Hence, when calling `png::WriteImageToBuffer`(https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/kernels/image/encode_png_op.cc#L79-L93), the first argument (i.e., `image.flat<T>().data()`) is `NULL`. This then triggers the `CHECK_NOTNULL` in the first line of `png::WriteImageToBuffer`(https://github.com/tensorflow/tensorflow/blob/e312e0791ce486a80c9d23110841525c6f7c3289/tensorflow/core/lib/png/png_io.cc#L345-L349). Since `image` is null, this results in `abort` being called after printing the stacktrace. Effectively, this allows an attacker to mount a denial of service attack. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| tensorflow | tensorflow | < 2.1.4 | - | - |
cpe:2.3:a:tensorflow:tensorflow:<_2.1.4:*:*:*:*:*:*:*
|
| tensorflow | tensorflow | >= 2.2.0, < 2.2.3 | - | - |
cpe:2.3:a:tensorflow:tensorflow:>=_2.2.0,_<_2.2.3:*:*:*:*:*:*:*
|
| tensorflow | tensorflow | >= 2.3.0, < 2.3.3 | - | - |
cpe:2.3:a:tensorflow:tensorflow:>=_2.3.0,_<_2.3.3:*:*:*:*:*:*:*
|
| tensorflow | tensorflow | >= 2.4.0, < 2.4.2 | - | - |
cpe:2.3:a:tensorflow:tensorflow:>=_2.4.0,_<_2.4.2:*:*:*:*:*:*:*
|
| tensorflow | * | - | - |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
LOWCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-29531 |
2025-11-11 15:20:55 | 2025-11-11 07:36:48 |
| NVD | nvd_CVE-2021-29531 |
2025-11-11 14:57:37 | 2025-11-11 07:45:07 |
| CNNVD | cnnvd_CNNVD-202105-939 |
2025-11-11 15:10:38 | 2025-11-11 07:56:45 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-202105-939
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 4 -> 5
- data_sources: ['cve'] -> ['cve', 'nvd']