-
Notifications
You must be signed in to change notification settings - Fork 2
Description
CVE-2022-29211 - Medium Severity Vulnerability
Vulnerable Library - tensorflow-2.0.0b1-cp36-cp36m-manylinux1_x86_64.whl
TensorFlow is an open source machine learning framework for everyone.
Library home page: https://files.pythonhosted.org/packages/29/6c/2c9a5c4d095c63c2fb37d20def0e4f92685f7aee9243d6aae25862694fd1/tensorflow-2.0.0b1-cp36-cp36m-manylinux1_x86_64.whl
Path to dependency file: /lite/micro/examples/magic_wand/train/requirements.txt
Path to vulnerable library: /lite/micro/examples/magic_wand/train/requirements.txt
Dependency Hierarchy:
- ❌ tensorflow-2.0.0b1-cp36-cp36m-manylinux1_x86_64.whl (Vulnerable Library)
Found in HEAD commit: 4386a6640c9fb65503750c37714971031f3dc1fd
Vulnerability Details
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of tf.histogram_fixed_width is vulnerable to a crash when the values array contain Not a Number (NaN) elements. The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index. If values contains NaN then the result of the division is still NaN and the cast to int32 would result in a crash. This only occurs on the CPU implementation. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
Publish Date: 2022-05-21
URL: CVE-2022-29211
CVSS 3 Score Details (5.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29211
Release Date: 2022-05-21
Fix Resolution: tensorflow - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-cpu - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-gpu - 2.6.4,2.7.2,2.8.1,2.9.0