Vulnerability Details : CVE-2022-35971
TensorFlow is an open source platform for machine learning. If `FakeQuantWithMinMaxVars` is given `min` or `max` tensors of a nonzero rank, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Vulnerability category: Denial of service
Products affected by CVE-2022-35971
- cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*
- cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*
- cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*
- cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-35971
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-35971
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-35971
-
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-35971
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9fpg-838v-wpv7
`CHECK` fail in `FakeQuantWithMinMaxVars` · Advisory · tensorflow/tensorflow · GitHubPatch;Third Party Advisory
-
https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0
Fix quantize ops input validation issues. · tensorflow/tensorflow@785d67a · GitHubPatch;Third Party Advisory
Jump to