Miggo Logo

CVE-2021-29598: Division by zero in TFLite's implementation of `SVDF`

2.5

CVSS Score
3.1

Basic Information

EPSS Score
0.0254%
Published
5/21/2021
Updated
11/13/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
tensorflowpip< 2.1.42.1.4
tensorflowpip>= 2.2.0, < 2.2.32.2.3
tensorflowpip>= 2.3.0, < 2.3.32.3.3
tensorflowpip>= 2.4.0, < 2.4.22.4.2
tensorflow-cpupip< 2.1.42.1.4
tensorflow-cpupip>= 2.2.0, < 2.2.32.2.3
tensorflow-cpupip>= 2.3.0, < 2.3.32.3.3
tensorflow-cpupip>= 2.4.0, < 2.4.22.4.2
tensorflow-gpupip< 2.1.42.1.4
tensorflow-gpupip>= 2.2.0, < 2.2.32.2.3
tensorflow-gpupip>= 2.3.0, < 2.3.32.3.3
tensorflow-gpupip>= 2.4.0, < 2.4.22.4.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the Prepare function in the SVDF operator implementation. The code explicitly checks TF_LITE_ENSURE_EQ(context, num_filters % rank, 0) without first ensuring rank != 0. The patch adds a TF_LITE_ENSURE(context, rank != 0) check immediately before this line, confirming this was the vulnerable location. The function's role in parameter validation and direct involvement in the division operation make this a high-confidence identification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T** impl*m*nt*tion o* t** `SV**` T*Lit* op*r*tor is [vuln*r**l* to * *ivision *y z*ro *rror](*ttps://*it*u*.*om/t*nsor*low/t*nsor*low/*lo*/****************************************/t*nsor*low/lit*/k*rn*ls/sv**.**#L**-L***): ```** *onst int

Reasoning

T** vuln*r**ility st*ms *rom t** Pr*p*r* *un*tion in t** SV** op*r*tor impl*m*nt*tion. T** *o** *xpli*itly ****ks T*_LIT*_*NSUR*_*Q(*ont*xt, num_*ilt*rs % r*nk, *) wit*out *irst *nsurin* r*nk != *. T** p*t** ***s * T*_LIT*_*NSUR*(*ont*xt, r*nk != *)