CVE-2021-29529

Source
https://cve.org/CVERecord?id=CVE-2021-29529
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-29529.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-29529
Aliases
Related
Published
2021-05-14T20:15:11.937Z
Modified
2026-04-11T17:12:37.869111Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a heap buffer overflow in tf.raw_ops.QuantizedResizeBilinear by manipulating input values so that float rounding results in off-by-one error in accessing image elements. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/44b7f486c0143f68b56c34e2d01e146ee445134a/tensorflow/core/kernels/quantizedresizebilinearop.cc#L62-L66) computes two integers (representing the upper and lower bounds for interpolation) by ceiling and flooring a floating point value. For some values of in, interpolation->upper[i] might be smaller than interpolation->lower[i]. This is an issue if interpolation->upper[i] is capped at in_size-1 as it means that interpolation->lower[i] points outside of the image. Then, in the interpolation code(https://github.com/tensorflow/tensorflow/blob/44b7f486c0143f68b56c34e2d01e146ee445134a/tensorflow/core/kernels/quantizedresizebilinearop.cc#L245-L264), this would result in heap buffer overflow. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

References

Affected packages

Git / github.com/tensorflow/tensorflow

Affected ranges

Type
GIT
Repo
https://github.com/tensorflow/tensorflow
Events
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2.1.4"
        },
        {
            "introduced": "2.2.0"
        },
        {
            "fixed": "2.2.3"
        },
        {
            "introduced": "2.3.0"
        },
        {
            "fixed": "2.3.3"
        },
        {
            "introduced": "2.4.0"
        },
        {
            "fixed": "2.4.2"
        }
    ]
}

Affected versions

0.*
0.5.0
0.6.0
v1.*
v1.1.0-rc1
v1.1.0-rc2
v1.12.1
v1.6.0-rc1
v1.9.0-rc2
v2.*
v2.1.0
v2.1.0-rc0
v2.1.0-rc1
v2.1.0-rc2
v2.1.1
v2.1.2
v2.1.3
v2.2.0
v2.2.1
v2.2.2
v2.3.0
v2.3.1
v2.3.2
v2.4.0
v2.4.1

Database specific

vanir_signatures
[
    {
        "digest": {
            "function_hash": "79936548757982839825053289543791019584",
            "length": 879.0
        },
        "id": "CVE-2021-29529-24b24460",
        "signature_type": "Function",
        "source": "https://github.com/tensorflow/tensorflow/commit/f851613f8f0fb0c838d160ced13c134f778e3ce7",
        "deprecated": false,
        "target": {
            "function": "ComputeInterpolationWeights",
            "file": "tensorflow/core/kernels/quantized_resize_bilinear_op.cc"
        },
        "signature_version": "v1"
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "5195542068191311488794511864501147944",
                "297630105122932560573898492780188886181",
                "198589435171940596408033809874918945122",
                "57600596003615603819528813689760321450"
            ]
        },
        "id": "CVE-2021-29529-27ae0210",
        "signature_type": "Line",
        "source": "https://github.com/tensorflow/tensorflow/commit/f851613f8f0fb0c838d160ced13c134f778e3ce7",
        "deprecated": false,
        "target": {
            "file": "tensorflow/core/kernels/quantized_resize_bilinear_op.cc"
        },
        "signature_version": "v1"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-29529.json"
vanir_signatures_modified
"2026-04-11T17:12:37Z"