You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of tf.histogram_fixed_width is vulnerable to a crash when the values array contain Not a Number (NaN) elements. The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index. If values contains NaN then the result of the division is still NaN and the cast to int32 would result in a crash. This only occurs on the CPU implementation. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
CVE-2022-29211 - Medium Severity Vulnerability
Vulnerable Library - tensorflow-2.0.0b1-cp36-cp36m-manylinux1_x86_64.whl
TensorFlow is an open source machine learning framework for everyone.
Library home page: https://files.pythonhosted.org/packages/29/6c/2c9a5c4d095c63c2fb37d20def0e4f92685f7aee9243d6aae25862694fd1/tensorflow-2.0.0b1-cp36-cp36m-manylinux1_x86_64.whl
Path to dependency file: /lite/micro/examples/magic_wand/train/requirements.txt
Path to vulnerable library: /lite/micro/examples/magic_wand/train/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 4386a6640c9fb65503750c37714971031f3dc1fd
Vulnerability Details
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of
tf.histogram_fixed_width
is vulnerable to a crash when the values array containNot a Number
(NaN
) elements. The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index. Ifvalues
containsNaN
then the result of the division is stillNaN
and the cast toint32
would result in a crash. This only occurs on the CPU implementation. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.Publish Date: 2022-05-21
URL: CVE-2022-29211
CVSS 3 Score Details (5.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29211
Release Date: 2022-05-21
Fix Resolution: tensorflow - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-cpu - 2.6.4,2.7.2,2.8.1,2.9.0;tensorflow-gpu - 2.6.4,2.7.2,2.8.1,2.9.0
The text was updated successfully, but these errors were encountered: