Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-AE132C6C-D716-11ED-956F-7054D21A9E2A (CVE-2022-35935): py-tensorflow -- denial of service vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-AE132C6C-D716-11ED-956F-7054D21A9E2A (CVE-2022-35935): py-tensorflow -- denial of service vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
09/16/2022
Created
05/05/2023
Added
04/14/2023
Modified
04/14/2023

Description

TensorFlow is an open source platform for machine learning. The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. This issue has been patched in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

Solution(s)

  • freebsd-upgrade-package-py310-tensorflow
  • freebsd-upgrade-package-py311-tensorflow
  • freebsd-upgrade-package-py37-tensorflow
  • freebsd-upgrade-package-py38-tensorflow
  • freebsd-upgrade-package-py39-tensorflow

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;