CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
51.9%
The implementation of MapStage
is vulnerable a CHECK
-fail if the key tensor is not a scalar:
import tensorflow as tf
import numpy as np
tf.raw_ops.MapStage(
key = tf.constant(value=[4], shape= (1,2), dtype=tf.int64),
indices = np.array([[6]]),
values = np.array([-60]),
dtypes = [tf.int64], capacity=0, memory_limit=0,
container='', shared_name='', name=None
)
We have patched the issue in GitHub commit f57315566d7094f322b784947093406c2aea0d7d.
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
~
Vendor | Product | Version | CPE |
---|---|---|---|
tensorflow | gpu | 2.7.0 | cpe:2.3:a:tensorflow:gpu:2.7.0:*:*:*:*:*:*:* |
tensorflow | gpu | * | cpe:2.3:a:tensorflow:gpu:*:*:*:*:*:*:*:* |
tensorflow | cpu | 2.7.0 | cpe:2.3:a:tensorflow:cpu:2.7.0:*:*:*:*:*:*:* |
tensorflow | cpu | * | cpe:2.3:a:tensorflow:cpu:*:*:*:*:*:*:*:* |
tensorflow | tensorflow | 2.7.0 | cpe:2.3:a:tensorflow:tensorflow:2.7.0:*:*:*:*:*:*:* |
tensorflow | tensorflow | * | cpe:2.3:a:tensorflow:tensorflow:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-gcvh-66ff-4mwm
github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550
github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d
github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm
nvd.nist.gov/vuln/detail/CVE-2022-21734
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
51.9%