{"data":{"id":"a8334022-f1ca-4224-8511-38b054ddba5f","title":"CVE-2021-29562: TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service by expl","summary":"TensorFlow (an open-source machine learning platform) has a vulnerability where an attacker can cause a denial of service (making a service unavailable) by triggering a CHECK-failure in the `tf.raw_ops.IRFFT` function, which is part of TensorFlow's low-level operations. This happens because of a reachable assertion (a check in the code that can be deliberately violated).","solution":"Update TensorFlow to version 2.5.0 or later. If you are using an older supported version, apply the patch available in TensorFlow 2.4.2, 2.3.3, 2.2.3, or 2.1.4, as these versions also received the fix through a cherrypick commit (the specific fix is available at https://github.com/tensorflow/tensorflow/commit/1c56f53be0b722ca657cbc7df461ed676c8642a2).","labels":["security"],"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2021-29562","publishedAt":"2021-05-15T00:15:13.467Z","cveId":"CVE-2021-29562","cweIds":["CWE-617"],"cvssScore":"2.5","cvssSeverity":"low","severity":"low","attackType":["denial_of_service"],"issueType":"vulnerability","affectedPackages":null,"affectedVendors":[],"affectedVendorsRaw":["TensorFlow"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":"unknown","epssScore":0.00015,"patchAvailable":null,"disclosureDate":null,"capecIds":null,"crossRefCount":0,"attackSophistication":"moderate","impactType":["availability"],"aiComponentTargeted":"framework","llmSpecific":false,"classifierConfidence":0.95,"researchCategory":null,"atlasIds":null}}