Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-AE132C6C-D716-11ED-956F-7054D21A9E2A (CVE-2022-35991): py-tensorflow -- denial of service vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-AE132C6C-D716-11ED-956F-7054D21A9E2A (CVE-2022-35991): py-tensorflow -- denial of service vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
09/16/2022
Created
05/05/2023
Added
04/14/2023
Modified
04/14/2023

Description

TensorFlow is an open source platform for machine learning. When `TensorListScatter` and `TensorListScatterV2` receive an `element_shape` of a rank greater than one, they give a `CHECK` fail that can trigger a denial of service attack. We have patched the issue in GitHub commit bb03fdf4aae944ab2e4b35c7daa051068a8b7f61. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

Solution(s)

  • freebsd-upgrade-package-py310-tensorflow
  • freebsd-upgrade-package-py311-tensorflow
  • freebsd-upgrade-package-py37-tensorflow
  • freebsd-upgrade-package-py38-tensorflow
  • freebsd-upgrade-package-py39-tensorflow

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;