Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-23583
HistoryFeb 04, 2022 - 10:32 p.m.

CVE-2022-23583 `CHECK`-failures in binary ops in Tensorflow

2022-02-0422:32:18
CWE-617
GitHub_M
www.cve.org
4
tensorflow open source machine learning framework dtype confusion check failures denial of service binary ops tensorflow 2.8.0 tensorflow 2.7.1 tensorflow 2.6.3 tensorflow 2.5.3 cve-2022-23583

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

51.9%

Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a SavedModel such that any binary op would trigger CHECK failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the dtype no longer matches the dtype expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved. If Tin and Tout don’t match the type of data in out and input_* tensors then flat<*> would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a CHECK crash, hence a denial of service. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.

CNA Affected

[
  {
    "product": "tensorflow",
    "vendor": "tensorflow",
    "versions": [
      {
        "status": "affected",
        "version": ">= 2.7.0, < 2.7.1"
      },
      {
        "status": "affected",
        "version": ">= 2.6.0, < 2.6.3"
      },
      {
        "status": "affected",
        "version": "< 2.5.3"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

51.9%

Related for CVELIST:CVE-2022-23583