René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

151 lines
6.0 KiB
JSON

{
"id": "CVE-2022-35940",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-09-16T20:15:10.307",
"lastModified": "2022-09-20T18:07:41.103",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "TensorFlow is an open source platform for machine learning. The `RaggedRangOp` function takes an argument `limits` that is eventually used to construct a `TensorShape` as an `int64`. If `limits` is a very large float, it can overflow when converted to an `int64`. This triggers an `InvalidArgument` but also throws an abort signal that crashes the program. We have patched the issue in GitHub commit 37cefa91bee4eace55715eeef43720b958a01192. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue."
},
{
"lang": "es",
"value": "TensorFlow es una plataforma de c\u00f3digo abierto para el aprendizaje autom\u00e1tico. La funci\u00f3n \"RaggedRangOp\" toma un argumento \"limits\" que es usada finalmente para construir un \"TensorShape\" como un \"int64\". Si \"limits\" es un flotador muy grande, puede desbordarse cuando es convertido en un \"int64\". Esto desencadena un \"InvalidArgument\" pero tambi\u00e9n lanza una se\u00f1al de interrupci\u00f3n que bloquea el programa. Hemos parcheado el problema en el commit 37cefa91bee4eace55715eeef43720b958a01192 de GitHub. La correcci\u00f3n ser\u00e1 incluida en TensorFlow versi\u00f3n 2.10.0. Tambi\u00e9n seleccionaremos este compromiso en TensorFlow 2.9.1, TensorFlow 2.8.1 y TensorFlow 2.7.2, ya que estos tambi\u00e9n est\u00e1n afectados y todav\u00eda est\u00e1n en el rango admitido. No se presentan mitigaciones conocidas para este problema"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.7.0",
"versionEndExcluding": "2.7.2",
"matchCriteriaId": "C4DFBF2D-5283-42F6-8800-D653BFA5CE82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.8.0",
"versionEndExcluding": "2.8.1",
"matchCriteriaId": "0F9D273D-02DC-441E-AA91-EAC8DEAA4B44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.9.0",
"versionEndExcluding": "2.9.1",
"matchCriteriaId": "FE4F8A81-6CC2-4F7F-9602-C170FDD926E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"matchCriteriaId": "1DBFBCE2-0A01-4575-BE45-6775ABFB8B28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "89806CF9-E423-4CA6-A01A-8175C260CB24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F2B80690-A257-4E16-BD27-9AE045BC56ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F335F9A4-5AB8-4E53-BC18-E01F7C653E5E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/kernels/ragged_range_op.cc#L74-L88",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/tensorflow/tensorflow/commit/37cefa91bee4eace55715eeef43720b958a01192",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x989-q2pq-4q5x",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}