Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-35989
HistorySep 16, 2022 - 9:35 p.m.

CVE-2022-35989 `CHECK` fail in `MaxPool` in TensorFlow

2022-09-1621:35:15
CWE-617
GitHub_M
www.cve.org
4
tensorflow
maxpool
denial of service
patch
github
commit
2.10.0
2.9.1
2.8.1
2.7.2

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

35.2%

TensorFlow is an open source platform for machine learning. When MaxPool receives a window size input array ksize with dimensions greater than its input tensor input, the GPU kernel gives a CHECK fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 32d7bd3defd134f21a4e344c8dfd40099aaf6b18. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

CNA Affected

[
  {
    "product": "tensorflow",
    "vendor": "tensorflow",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.7.2"
      },
      {
        "status": "affected",
        "version": ">= 2.8.0, < 2.8.1"
      },
      {
        "status": "affected",
        "version": ">= 2.9.0, < 2.9.1"
      }
    ]
  }
]

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

35.2%

Related for CVELIST:CVE-2022-35989