CVE-2022-35939 – tensorflow-gpu
Package
Manager: pip
Name: tensorflow-gpu
Vulnerable Version: >=0 <2.7.2 || >=2.8.0 <2.8.1 || >=2.9.0 <2.9.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00202 pctl0.42546
Details
TensorFlow vulnerable to OOB write in `scatter_nd` in TF Lite ### Impact The [`ScatterNd`](https://github.com/tensorflow/tensorflow/blob/266558ac4c1f361e9a178ee9d3f0ce2e648ae499/tensorflow/lite/kernels/internal/reference/reference_ops.h#L659-L698) function takes an input argument that determines the indices of of the output tensor. An input index greater than the output tensor or less than zero will either write content at the wrong index or trigger a crash. ### Patches We have patched the issue in GitHub commit [b4d4b4cb019bd7240a52daa4ba61e3cc814f0384](https://github.com/tensorflow/tensorflow/commit/b4d4b4cb019bd7240a52daa4ba61e3cc814f0384). The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Hui Peng from Baidu Security.
Metadata
Created: 2022-09-16T21:04:23Z
Modified: 2022-09-19T19:56:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-ffjm-4qwc-7cmf/GHSA-ffjm-4qwc-7cmf.json
CWE IDs: ["CWE-787"]
Alternative ID: GHSA-ffjm-4qwc-7cmf
Finding: F111
Auto approve: 1