-
Notifications
You must be signed in to change notification settings - Fork 2
Description
CVE-2022-29196 - Medium Severity Vulnerability
Vulnerable Library - tensorflow-2.0.0b1-cp36-cp36m-manylinux1_x86_64.whl
TensorFlow is an open source machine learning framework for everyone.
Library home page: https://files.pythonhosted.org/packages/29/6c/2c9a5c4d095c63c2fb37d20def0e4f92685f7aee9243d6aae25862694fd1/tensorflow-2.0.0b1-cp36-cp36m-manylinux1_x86_64.whl
Path to dependency file: /lite/micro/examples/magic_wand/train/requirements.txt
Path to vulnerable library: /lite/micro/examples/magic_wand/train/requirements.txt
Dependency Hierarchy:
- ❌ tensorflow-2.0.0b1-cp36-cp36m-manylinux1_x86_64.whl (Vulnerable Library)
Vulnerability Details
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of tf.raw_ops.Conv3DBackpropFilterV2 does not fully validate the input arguments. This results in a CHECK-failure which can be used to trigger a denial of service attack. The code does not validate that the filter_sizes argument is a vector. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
Publish Date: 2022-05-20
URL: CVE-2022-29196
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196
Release Date: 2022-05-20
Fix Resolution: tensorflow - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-cpu - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-gpu - 2.6.4,2.7.2,2.8.1,2.9.0