2023-07-13 16:01:09 +00:00

147 lines
5.5 KiB
JSON

{
"id": "CVE-2022-23563",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-02-04T23:15:13.897",
"lastModified": "2023-07-13T14:28:25.617",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Tensorflow is an Open Source Machine Learning Framework. In multiple places, TensorFlow uses `tempfile.mktemp` to create temporary files. While this is acceptable in testing, in utilities and libraries it is dangerous as a different process can create the file between the check for the filename in `mktemp` and the actual creation of the file by a subsequent operation (a TOC/TOU type of weakness). In several instances, TensorFlow was supposed to actually create a temporary directory instead of a file. This logic bug is hidden away by the `mktemp` function usage. We have patched the issue in several commits, replacing `mktemp` with the safer `mkstemp`/`mkdtemp` functions, according to the usage pattern. Users are advised to upgrade as soon as possible."
},
{
"lang": "es",
"value": "Tensorflow es un Marco de Aprendizaje Autom\u00e1tico de C\u00f3digo Abierto. En varios lugares, TensorFlow usa \"tempfile.mktemp\" para crear archivos temporales. Mientras que esto es aceptable en las pruebas, en las utilidades y bibliotecas es peligroso ya que un proceso diferente puede crear el archivo entre la comprobaci\u00f3n del nombre del archivo en \"mktemp\" y la creaci\u00f3n real del archivo por una operaci\u00f3n posterior (una debilidad del tipo TOC/TOU). En varios casos, se supone que TensorFlow deber\u00eda crear un directorio temporal en lugar de un archivo. Este error l\u00f3gico est\u00e1 oculto por el uso de la funci\u00f3n \"mktemp\". Hemos parcheado el problema en varios commits, sustituyendo \"mktemp\" por las funciones m\u00e1s seguras \"mkstemp\"/\"mkdtemp\", de acuerdo con el patr\u00f3n de uso. Se recomienda a usuarios que actualicen lo antes posible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 5.2
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.4,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.5.2",
"matchCriteriaId": "688150BF-477C-48FC-9AEF-A79AC57A6DDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.0",
"versionEndIncluding": "2.6.2",
"matchCriteriaId": "C9E69B60-8C97-47E2-9027-9598B8392E5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EDFAAB8-799C-4259-9102-944D4760DA2C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wc4g-r73w-x8mm",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}