Summary: | sci-libs/tensorflow: multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | ajak, kfm, mmokrejs, perfinion |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | ~2 [noglsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 922374 |
Description
John Helmert III
2021-08-10 23:56:31 UTC
Ping New vulnerabilities fixed in 2.5.3, 2.6.3, 2.7.1, and 2.8.0. Actually, other branches still need bumping. (In reply to John Helmert III from comment #4) > Actually, other branches still need bumping. New CVEs fixed in 2.6.4, 2.7.2, 2.8.1. https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4 https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2 https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1 New CVEs fixed in 2.7.4, 2.8.3, 2.9.2. More CVEs fixed in 2.8.4, 2.9.3, 2.10.1. CVE-2023-25676 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6wfh-89q8-44jq): TensorFlow is an open source machine learning platform. When running versions prior to 2.12.0 and 2.11.1 with XLA, `tf.raw_ops.ParallelConcat` segfaults with a nullptr dereference when given a parameter `shape` with rank that is not greater than zero. A fix is available in TensorFlow 2.12.0 and 2.11.1. CVE-2023-25801 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f49c-87jh-g47q): TensorFlow is an open source machine learning platform. Prior to versions 2.12.0 and 2.11.1, `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. A fix is included in TensorFlow 2.12.0 and 2.11.1. CVE-2023-27579 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5w96-866f-6rm8): TensorFlow is an end-to-end open source platform for machine learning. Constructing a tflite model with a paramater `filter_input_channel` of less than 1 gives a FPE. This issue has been patched in version 2.12. TensorFlow will also cherrypick the fix commit on TensorFlow 2.11.1. CVE-2023-28437 (https://github.com/dataease/dataease/security/advisories/GHSA-7j7j-9rw6-3r56): Dataease is an open source data visualization and analysis tool. The blacklist for SQL injection protection is missing entries. This vulnerability has been fixed in version 1.18.5. There are no known workarounds. CVE-2023-25658 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-68v3-g9cm-rmm6): TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, an out of bounds read is in GRUBlockCellGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1. CVE-2023-25659 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-93vr-9q9m-pj8p): TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the parameter `indices` for `DynamicStitch` does not match the shape of the parameter `data`, it can trigger an stack OOB read. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. CVE-2023-25660 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjqc-vqcf-5qvj): TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when the parameter `summarize` of `tf.raw_ops.Print` is zero, the new method `SummarizeArray<bool>` will reference to a nullptr, leading to a seg fault. A fix is included in TensorFlow version 2.12 and version 2.11.1. CVE-2023-25662 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7jvm-xxmr-v5cw): TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 are vulnerable to integer overflow in EditDistance. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. CVE-2023-25663 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-64jg-wjww-7c5w): TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `ctx->step_containter()` is a null ptr, the Lookup function will be executed with a null pointer. A fix is included in TensorFlow 2.12.0 and 2.11.1. CVE-2023-25664 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hg6-5c2q-7rcr): TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a heap buffer overflow in TAvgPoolGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1. CVE-2023-25665 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-558h-mq8x-7q9g): TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give a null pointer error. A fix is included in TensorFlow version 2.12 and version 2.11.1. CVE-2023-25666 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2): TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a floating point exception in AudioSpectrogram. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. CVE-2023-25667 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqm2-gh8w-gr68): TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, integer overflow occurs when `2^31 <= num_frames * height * width * channels < 2^32`, for example Full HD screencast of at least 346 frames. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. CVE-2023-25668 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gw97-ff7c-9v96): TensorFlow is an open source platform for machine learning. Attackers using Tensorflow prior to 2.12.0 or 2.11.1 can access heap memory which is not in the control of user, leading to a crash or remote code execution. The fix will be included in TensorFlow version 2.12.0 and will also cherrypick this commit on TensorFlow version 2.11.1. CVE-2023-25669 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rcf8-g8jv-vg6p): TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give a floating point exception. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. CVE-2023-25670 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w): TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a null point error in QuantizedMatMulWithBiasAndDequantize with MKL enabled. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. CVE-2023-25671 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j5w9-hmfh-4cr6): TensorFlow is an open source platform for machine learning. There is out-of-bounds access due to mismatched integer type sizes. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. CVE-2023-25672 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-94mm-g2mv-8p7r): TensorFlow is an open source platform for machine learning. The function `tf.raw_ops.LookupTableImportV2` cannot handle scalars in the `values` parameter and gives an NPE. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. CVE-2023-25673 (https://github.com/tensorflow/tensorflow/commit/728113a3be690facad6ce436660a0bc1858017fa): TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a Floating Point Exception in TensorListSplit with XLA. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. CVE-2023-25674 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf97-q72m-7579): TensorFlow is an open source machine learning platform. Versions prior to 2.12.0 and 2.11.1 have a null pointer error in RandomShuffle with XLA enabled. A fix is included in TensorFlow 2.12.0 and 2.11.1. CVE-2023-25675 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7x4v-9gxg-9hwj): TensorFlow is an open source machine learning platform. When running versions prior to 2.12.0 and 2.11.1 with XLA, `tf.raw_ops.Bincount` segfaults when given a parameter `weights` that is neither the same shape as parameter `arr` nor a length-0 tensor. A fix is included in TensorFlow 2.12.0 and 2.11.1. CVE-2023-25661 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxgc-95xx-grvq): TensorFlow is an Open Source Machine Learning Framework. In versions prior to 2.11.1 a malicious invalid input crashes a tensorflow model (Check Failed) and can be used to trigger a denial of service attack. A proof of concept can be constructed with the `Convolution3DTranspose` function. This Convolution3DTranspose layer is a very common API in modern neural networks. The ML models containing such vulnerable components could be deployed in ML applications or as cloud services. This failure could be potentially used to trigger a denial of service attack on ML cloud services. An attacker must have privilege to provide input to a `Convolution3DTranspose` call. This issue has been patched and users are advised to upgrade to version 2.11.1. There are no known workarounds for this vulnerability. Fixed in 2.12.0 (needs revbump): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27579 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25801 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25676 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25674 I'm not sure how useful this append-only list of CVEs is. Maybe we should we trim the list down to CVEs affecting versions currently available in portage, or open a different bug for each tensorflow version available in portage ? (In reply to Vincent de Phily from comment #10) > Fixed in 2.12.0 (needs revbump): > > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27579 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25801 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25676 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25675 > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25674 > > I'm not sure how useful this append-only list of CVEs is. Maybe we should we > trim the list down to CVEs affecting versions currently available in > portage, or open a different bug for each tensorflow version available in > portage ? We should keep all CVEs affecting packages in Gentoo in a bug somehow, so we can always track the state of vulnerabilities affecting us. We could open a new bug per round of security fixes in tensorflow, sure. The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f57039ebc84c40eddf9f6a63afbbf86a8b3c42da commit f57039ebc84c40eddf9f6a63afbbf86a8b3c42da Author: Jakov Smolić <jsmolic@gentoo.org> AuthorDate: 2024-02-24 12:47:06 +0000 Commit: Jakov Smolić <jsmolic@gentoo.org> CommitDate: 2024-02-24 12:47:06 +0000 sci-libs/tensorflow: treeclean Bug: https://bugs.gentoo.org/807625 Closes: https://bugs.gentoo.org/906609 Closes: https://bugs.gentoo.org/905673 Closes: https://bugs.gentoo.org/913731 Closes: https://bugs.gentoo.org/882617 Closes: https://bugs.gentoo.org/881445 Closes: https://bugs.gentoo.org/915621 Closes: https://bugs.gentoo.org/909002 Closes: https://bugs.gentoo.org/705712 Closes: https://bugs.gentoo.org/873295 Closes: https://bugs.gentoo.org/907031 Closes: https://bugs.gentoo.org/909003 Closes: https://bugs.gentoo.org/909767 Closes: https://bugs.gentoo.org/913534 Closes: https://bugs.gentoo.org/818766 Closes: https://bugs.gentoo.org/830167 Closes: https://bugs.gentoo.org/854354 Closes: https://bugs.gentoo.org/851573 Closes: https://bugs.gentoo.org/780468 Closes: https://bugs.gentoo.org/910029 Closes: https://bugs.gentoo.org/897228 Closes: https://bugs.gentoo.org/844196 Closes: https://bugs.gentoo.org/910030 Closes: https://bugs.gentoo.org/897230 Closes: https://bugs.gentoo.org/788064 Signed-off-by: Jakov Smolić <jsmolic@gentoo.org> profiles/package.mask | 1 - sci-libs/tensorflow/Manifest | 57 -- ...dd-rules-docker-http_archive-bazel-toolch.patch | 37 - ...emlib-Latest-absl-LTS-has-split-cord-libs.patch | 32 - ...Must-link-against-libm-for-round-and-log2.patch | 29 - ...ensorflow_cc-Add-systemlib-nsync-linkopts.patch | 35 - ...systemlib-Updates-for-Abseil-20220623-LTS.patch | 71 -- ...0006-systemlib-Update-targets-for-absl_py.patch | 24 - ...temlib-Add-well_known_types_py_pb2-target.patch | 28 - ...-0008-Relax-setup.py-version-requirements.patch | 86 -- ....0-0009-systemlib-update-targets-for-absl.patch | 365 -------- ...010-systemlib-fix-missing-osx-in-pybind11.patch | 25 - ...temlib-fix-missing-LICENSE-in-flatbuffers.patch | 25 - ...nstallation-remove-cp_local_config_python.patch | 68 -- ...2.15.0-0013-build-use-non-hermetic-python.patch | 990 --------------------- sci-libs/tensorflow/metadata.xml | 15 - sci-libs/tensorflow/tensorflow-2.15.0.ebuild | 464 ---------- 17 files changed, 2352 deletions(-) So did not you at least close the issue as WONTFIX. The tag FIXED is just confusing? You did not FIX anything and you just made it difficult to find what was left unfixed. Just removed for the portage tree. (In reply to Martin Mokrejš from comment #13) > So did not you at least close the issue as WONTFIX. The tag FIXED is just > confusing? You did not FIX anything and you just made it difficult to find > what was left unfixed. Just removed for the portage tree. Yeah, there should probably a special "Wontfixes" tag or something for this particular case. WONTFIX already exists, just use it. ;-) Right, but that's not accessible from the tags in commits. This bug *is* fixed for our purposes for what it's worth, so the resolution happens to be correct here. |