logo

CVE-2022-35939 tensorflow-gpu

Package

Manager: pip
Name: tensorflow-gpu
Vulnerable Version: >=0 <2.7.2 || >=2.8.0 <2.8.1 || >=2.9.0 <2.9.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00202 pctl0.42546

Details

TensorFlow vulnerable to OOB write in `scatter_nd` in TF Lite ### Impact The [`ScatterNd`](https://github.com/tensorflow/tensorflow/blob/266558ac4c1f361e9a178ee9d3f0ce2e648ae499/tensorflow/lite/kernels/internal/reference/reference_ops.h#L659-L698) function takes an input argument that determines the indices of of the output tensor. An input index greater than the output tensor or less than zero will either write content at the wrong index or trigger a crash. ### Patches We have patched the issue in GitHub commit [b4d4b4cb019bd7240a52daa4ba61e3cc814f0384](https://github.com/tensorflow/tensorflow/commit/b4d4b4cb019bd7240a52daa4ba61e3cc814f0384). The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Hui Peng from Baidu Security.

Metadata

Created: 2022-09-16T21:04:23Z
Modified: 2022-09-19T19:56:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-ffjm-4qwc-7cmf/GHSA-ffjm-4qwc-7cmf.json
CWE IDs: ["CWE-787"]
Alternative ID: GHSA-ffjm-4qwc-7cmf
Finding: F111
Auto approve: 1