Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 807625 (CVE-2021-37635, CVE-2021-37636, CVE-2021-37637, CVE-2021-37638, CVE-2021-37639, CVE-2021-37640, CVE-2021-37641, CVE-2021-37642, CVE-2021-37643, CVE-2021-37644, CVE-2021-37645, CVE-2021-37646, CVE-2021-37647, CVE-2021-37648, CVE-2021-37649, CVE-2021-37650, CVE-2021-37651, CVE-2021-37652, CVE-2021-37653, CVE-2021-37654, CVE-2021-37655, CVE-2021-37656, CVE-2021-37657, CVE-2021-37658, CVE-2021-37659, CVE-2021-37660, CVE-2021-37661, CVE-2021-37662, CVE-2021-37663, CVE-2021-37664, CVE-2021-37665, CVE-2021-37666, CVE-2021-37667, CVE-2021-37668, CVE-2021-37669, CVE-2021-37670, CVE-2021-37671, CVE-2021-37672, CVE-2021-37673, CVE-2021-37674, CVE-2021-37675, CVE-2021-37676, CVE-2021-37677, CVE-2021-37678, CVE-2021-37679, CVE-2021-37680, CVE-2021-37681, CVE-2021-37682, CVE-2021-37683, CVE-2021-37684, CVE-2021-37685, CVE-2021-37686, CVE-2021-37687, CVE-2021-37688, CVE-2021-37689, CVE-2021-37690, CVE-2021-37691, CVE-2021-37692, CVE-2021-41195, CVE-2021-41196, CVE-2021-41197, CVE-2021-41198, CVE-2021-41199, CVE-2021-41200, CVE-2021-41201, CVE-2021-41202, CVE-2021-41203, CVE-2021-41204, CVE-2021-41205, CVE-2021-41206, CVE-2021-41207, CVE-2021-41208, CVE-2021-41209, CVE-2021-41210, CVE-2021-41212, CVE-2021-41213, CVE-2021-41214, CVE-2021-41215, CVE-2021-41216, CVE-2021-41217, CVE-2021-41218, CVE-2021-41219, CVE-2021-41221, CVE-2021-41222, CVE-2021-41223, CVE-2021-41224, CVE-2021-41225, CVE-2021-41226, CVE-2021-41227, CVE-2021-41228, CVE-2022-21725, CVE-2022-21726, CVE-2022-21727, CVE-2022-21728, CVE-2022-21729, CVE-2022-21730, CVE-2022-21731, CVE-2022-21732, CVE-2022-21733, CVE-2022-21734, CVE-2022-21735, CVE-2022-21736, CVE-2022-21737, CVE-2022-21738, CVE-2022-21739, CVE-2022-21740, CVE-2022-21741, CVE-2022-23557, CVE-2022-23558, CVE-2022-23559, CVE-2022-23560, CVE-2022-23561, CVE-2022-23562, CVE-2022-23563, CVE-2022-23564, CVE-2022-23565, CVE-2022-23566, CVE-2022-23567, CVE-2022-23568, CVE-2022-23569, CVE-2022-23570, CVE-2022-23571, CVE-2022-23572, CVE-2022-23573, CVE-2022-23574, CVE-2022-23575, CVE-2022-23576, CVE-2022-23577, CVE-2022-23578, CVE-2022-23579, CVE-2022-23580, CVE-2022-23581, CVE-2022-23582, CVE-2022-23583, CVE-2022-23584, CVE-2022-23585, CVE-2022-23586, CVE-2022-23587, CVE-2022-23588, CVE-2022-23589, CVE-2022-23590, CVE-2022-23591, CVE-2022-23594, CVE-2022-23595, CVE-2022-27778, CVE-2022-29191, CVE-2022-29192, CVE-2022-29193, CVE-2022-29194, CVE-2022-29195, CVE-2022-29196, CVE-2022-29197, CVE-2022-29198, CVE-2022-29199, CVE-2022-29200, CVE-2022-29201, CVE-2022-29202, CVE-2022-29203, CVE-2022-29204, CVE-2022-29205, CVE-2022-29206, CVE-2022-29207, CVE-2022-29208, CVE-2022-29209, CVE-2022-29210, CVE-2022-29211, CVE-2022-29212, CVE-2022-29213, CVE-2022-29216, CVE-2022-35934, CVE-2022-35935, CVE-2022-35937, CVE-2022-35938, CVE-2022-35939, CVE-2022-35940, CVE-2022-35941, CVE-2022-35952, CVE-2022-35959, CVE-2022-35960, CVE-2022-35963, CVE-2022-35964, CVE-2022-35965, CVE-2022-35966, CVE-2022-35967, CVE-2022-35968, CVE-2022-35969, CVE-2022-35970, CVE-2022-35971, CVE-2022-35972, CVE-2022-35973, CVE-2022-35974, CVE-2022-35979, CVE-2022-35981, CVE-2022-35982, CVE-2022-35983, CVE-2022-35984, CVE-2022-35985, CVE-2022-35986, CVE-2022-35987, CVE-2022-35988, CVE-2022-35989, CVE-2022-35990, CVE-2022-35991, CVE-2022-35992, CVE-2022-35993, CVE-2022-35994, CVE-2022-35995, CVE-2022-35996, CVE-2022-35997, CVE-2022-35998, CVE-2022-35999, CVE-2022-36000, CVE-2022-36001, CVE-2022-36002, CVE-2022-36003, CVE-2022-36004, CVE-2022-36005, CVE-2022-36011, CVE-2022-36012, CVE-2022-36013, CVE-2022-36014, CVE-2022-36015, CVE-2022-36016, CVE-2022-36017, CVE-2022-36018, CVE-2022-36019, CVE-2022-36026, CVE-2022-36027, CVE-2022-41880, CVE-2022-41883, CVE-2022-41884, CVE-2022-41885, CVE-2022-41886, CVE-2022-41887, CVE-2022-41888, CVE-2022-41889, CVE-2022-41890, CVE-2022-41891, CVE-2022-41893, CVE-2022-41894, CVE-2022-41895, CVE-2022-41896, CVE-2022-41897, CVE-2022-41898, CVE-2022-41899, CVE-2022-41900, CVE-2022-41901, CVE-2022-41902, CVE-2022-41907, CVE-2022-41908, CVE-2022-41909, CVE-2022-41910, CVE-2022-41911, CVE-2023-25658, CVE-2023-25659, CVE-2023-25660, CVE-2023-25662, CVE-2023-25663, CVE-2023-25664, CVE-2023-25665, CVE-2023-25666, CVE-2023-25667, CVE-2023-25668, CVE-2023-25669, CVE-2023-25670, CVE-2023-25671, CVE-2023-25672, CVE-2023-25673, CVE-2023-25674, CVE-2023-25675, CVE-2023-25676, CVE-2023-25801, CVE-2023-27579, CVE-2023-28437) - sci-libs/tensorflow: multiple vulnerabilities
Summary: sci-libs/tensorflow: multiple vulnerabilities
Status: IN_PROGRESS
Alias: CVE-2021-37635, CVE-2021-37636, CVE-2021-37637, CVE-2021-37638, CVE-2021-37639, CVE-2021-37640, CVE-2021-37641, CVE-2021-37642, CVE-2021-37643, CVE-2021-37644, CVE-2021-37645, CVE-2021-37646, CVE-2021-37647, CVE-2021-37648, CVE-2021-37649, CVE-2021-37650, CVE-2021-37651, CVE-2021-37652, CVE-2021-37653, CVE-2021-37654, CVE-2021-37655, CVE-2021-37656, CVE-2021-37657, CVE-2021-37658, CVE-2021-37659, CVE-2021-37660, CVE-2021-37661, CVE-2021-37662, CVE-2021-37663, CVE-2021-37664, CVE-2021-37665, CVE-2021-37666, CVE-2021-37667, CVE-2021-37668, CVE-2021-37669, CVE-2021-37670, CVE-2021-37671, CVE-2021-37672, CVE-2021-37673, CVE-2021-37674, CVE-2021-37675, CVE-2021-37676, CVE-2021-37677, CVE-2021-37678, CVE-2021-37679, CVE-2021-37680, CVE-2021-37681, CVE-2021-37682, CVE-2021-37683, CVE-2021-37684, CVE-2021-37685, CVE-2021-37686, CVE-2021-37687, CVE-2021-37688, CVE-2021-37689, CVE-2021-37690, CVE-2021-37691, CVE-2021-37692, CVE-2021-41195, CVE-2021-41196, CVE-2021-41197, CVE-2021-41198, CVE-2021-41199, CVE-2021-41200, CVE-2021-41201, CVE-2021-41202, CVE-2021-41203, CVE-2021-41204, CVE-2021-41205, CVE-2021-41206, CVE-2021-41207, CVE-2021-41208, CVE-2021-41209, CVE-2021-41210, CVE-2021-41212, CVE-2021-41213, CVE-2021-41214, CVE-2021-41215, CVE-2021-41216, CVE-2021-41217, CVE-2021-41218, CVE-2021-41219, CVE-2021-41221, CVE-2021-41222, CVE-2021-41223, CVE-2021-41224, CVE-2021-41225, CVE-2021-41226, CVE-2021-41227, CVE-2021-41228, CVE-2022-21725, CVE-2022-21726, CVE-2022-21727, CVE-2022-21728, CVE-2022-21729, CVE-2022-21730, CVE-2022-21731, CVE-2022-21732, CVE-2022-21733, CVE-2022-21734, CVE-2022-21735, CVE-2022-21736, CVE-2022-21737, CVE-2022-21738, CVE-2022-21739, CVE-2022-21740, CVE-2022-21741, CVE-2022-23557, CVE-2022-23558, CVE-2022-23559, CVE-2022-23560, CVE-2022-23561, CVE-2022-23562, CVE-2022-23563, CVE-2022-23564, CVE-2022-23565, CVE-2022-23566, CVE-2022-23567, CVE-2022-23568, CVE-2022-23569, CVE-2022-23570, CVE-2022-23571, CVE-2022-23572, CVE-2022-23573, CVE-2022-23574, CVE-2022-23575, CVE-2022-23576, CVE-2022-23577, CVE-2022-23578, CVE-2022-23579, CVE-2022-23580, CVE-2022-23581, CVE-2022-23582, CVE-2022-23583, CVE-2022-23584, CVE-2022-23585, CVE-2022-23586, CVE-2022-23587, CVE-2022-23588, CVE-2022-23589, CVE-2022-23590, CVE-2022-23591, CVE-2022-23594, CVE-2022-23595, CVE-2022-27778, CVE-2022-29191, CVE-2022-29192, CVE-2022-29193, CVE-2022-29194, CVE-2022-29195, CVE-2022-29196, CVE-2022-29197, CVE-2022-29198, CVE-2022-29199, CVE-2022-29200, CVE-2022-29201, CVE-2022-29202, CVE-2022-29203, CVE-2022-29204, CVE-2022-29205, CVE-2022-29206, CVE-2022-29207, CVE-2022-29208, CVE-2022-29209, CVE-2022-29210, CVE-2022-29211, CVE-2022-29212, CVE-2022-29213, CVE-2022-29216, CVE-2022-35934, CVE-2022-35935, CVE-2022-35937, CVE-2022-35938, CVE-2022-35939, CVE-2022-35940, CVE-2022-35941, CVE-2022-35952, CVE-2022-35959, CVE-2022-35960, CVE-2022-35963, CVE-2022-35964, CVE-2022-35965, CVE-2022-35966, CVE-2022-35967, CVE-2022-35968, CVE-2022-35969, CVE-2022-35970, CVE-2022-35971, CVE-2022-35972, CVE-2022-35973, CVE-2022-35974, CVE-2022-35979, CVE-2022-35981, CVE-2022-35982, CVE-2022-35983, CVE-2022-35984, CVE-2022-35985, CVE-2022-35986, CVE-2022-35987, CVE-2022-35988, CVE-2022-35989, CVE-2022-35990, CVE-2022-35991, CVE-2022-35992, CVE-2022-35993, CVE-2022-35994, CVE-2022-35995, CVE-2022-35996, CVE-2022-35997, CVE-2022-35998, CVE-2022-35999, CVE-2022-36000, CVE-2022-36001, CVE-2022-36002, CVE-2022-36003, CVE-2022-36004, CVE-2022-36005, CVE-2022-36011, CVE-2022-36012, CVE-2022-36013, CVE-2022-36014, CVE-2022-36015, CVE-2022-36016, CVE-2022-36017, CVE-2022-36018, CVE-2022-36019, CVE-2022-36026, CVE-2022-36027, CVE-2022-41880, CVE-2022-41883, CVE-2022-41884, CVE-2022-41885, CVE-2022-41886, CVE-2022-41887, CVE-2022-41888, CVE-2022-41889, CVE-2022-41890, CVE-2022-41891, CVE-2022-41893, CVE-2022-41894, CVE-2022-41895, CVE-2022-41896, CVE-2022-41897, CVE-2022-41898, CVE-2022-41899, CVE-2022-41900, CVE-2022-41901, CVE-2022-41902, CVE-2022-41907, CVE-2022-41908, CVE-2022-41909, CVE-2022-41910, CVE-2022-41911, CVE-2023-25658, CVE-2023-25659, CVE-2023-25660, CVE-2023-25662, CVE-2023-25663, CVE-2023-25664, CVE-2023-25665, CVE-2023-25666, CVE-2023-25667, CVE-2023-25668, CVE-2023-25669, CVE-2023-25670, CVE-2023-25671, CVE-2023-25672, CVE-2023-25673, CVE-2023-25674, CVE-2023-25675, CVE-2023-25676, CVE-2023-25801, CVE-2023-27579, CVE-2023-28437
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~2 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2021-08-10 23:56 UTC by John Helmert III
Modified: 2023-03-26 17:42 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-08-10 23:56:31 UTC
2.4 changelog: https://github.com/tensorflow/tensorflow/releases/tag/v2.4.3
2.5 changelog: https://github.com/tensorflow/tensorflow/releases/tag/v2.5.1

Please bump to 2.4.3 and 2.5.1.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-10-17 15:30:01 UTC
Ping
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-11-02 23:31:08 UTC
Ping

https://github.com/tensorflow/tensorflow/releases/tag/v2.5.2
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-02-03 02:48:39 UTC
New vulnerabilities fixed in 2.5.3, 2.6.3, 2.7.1, and 2.8.0.
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-16 18:25:25 UTC
Actually, other branches still need bumping.
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-16 18:26:07 UTC
(In reply to John Helmert III from comment #4)
> Actually, other branches still need bumping.

New CVEs fixed in 2.6.4, 2.7.2, 2.8.1.

https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4
https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2
https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1
Comment 6 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-03 14:24:47 UTC
New CVEs fixed in 2.7.4, 2.8.3, 2.9.2.
Comment 7 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-16 20:53:37 UTC
More CVEs fixed in 2.8.4, 2.9.3, 2.10.1.
Comment 8 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-03-26 17:42:19 UTC
CVE-2023-25676 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6wfh-89q8-44jq):

TensorFlow is an open source machine learning platform. When running versions prior to 2.12.0 and 2.11.1 with XLA, `tf.raw_ops.ParallelConcat` segfaults with a nullptr dereference when given a parameter `shape` with rank that is not greater than zero. A fix is available in TensorFlow 2.12.0 and 2.11.1.

CVE-2023-25801 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f49c-87jh-g47q):

TensorFlow is an open source machine learning platform. Prior to versions 2.12.0 and 2.11.1, `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. A fix is included in TensorFlow 2.12.0 and 2.11.1.

CVE-2023-27579 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5w96-866f-6rm8):

TensorFlow is an end-to-end open source platform for machine learning. Constructing a tflite model with a paramater `filter_input_channel` of less than 1 gives a FPE. This issue has been patched in version 2.12. TensorFlow will also cherrypick the fix commit on TensorFlow 2.11.1.

CVE-2023-28437 (https://github.com/dataease/dataease/security/advisories/GHSA-7j7j-9rw6-3r56):

Dataease is an open source data visualization and analysis tool. The blacklist for SQL injection protection is missing entries. This vulnerability has been fixed in version 1.18.5. There are no known workarounds.

CVE-2023-25658 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-68v3-g9cm-rmm6):

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, an out of bounds read is in GRUBlockCellGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1.

CVE-2023-25659 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-93vr-9q9m-pj8p):

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the parameter `indices` for `DynamicStitch` does not match the shape of the parameter `data`, it can trigger an stack OOB read. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.

CVE-2023-25660 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjqc-vqcf-5qvj):

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when the parameter `summarize` of `tf.raw_ops.Print` is zero, the new method `SummarizeArray<bool>` will reference to a nullptr, leading to a seg fault. A fix is included in TensorFlow version 2.12 and version 2.11.1.

CVE-2023-25662 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7jvm-xxmr-v5cw):

TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 are vulnerable to integer overflow in EditDistance. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.

CVE-2023-25663 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-64jg-wjww-7c5w):

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `ctx->step_containter()` is a null ptr, the Lookup function will be executed with a null pointer. A fix is included in TensorFlow 2.12.0 and 2.11.1.

CVE-2023-25664 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hg6-5c2q-7rcr):

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a heap buffer overflow in TAvgPoolGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1.

CVE-2023-25665 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-558h-mq8x-7q9g):

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give a null pointer error. A fix is included in TensorFlow version 2.12 and version 2.11.1.

CVE-2023-25666 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2):

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a floating point exception in AudioSpectrogram. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.

CVE-2023-25667 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqm2-gh8w-gr68):

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, integer overflow occurs when `2^31 <= num_frames * height * width * channels < 2^32`, for example Full HD screencast of at least 346 frames. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.

CVE-2023-25668 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gw97-ff7c-9v96):

TensorFlow is an open source platform for machine learning. Attackers using Tensorflow prior to 2.12.0 or 2.11.1 can access heap memory which is not in the control of user, leading to a crash or remote code execution. The fix will be included in TensorFlow version 2.12.0 and will also cherrypick this commit on TensorFlow version 2.11.1.

CVE-2023-25669 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rcf8-g8jv-vg6p):

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give a floating point exception. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.

CVE-2023-25670 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w):

TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a null point error in QuantizedMatMulWithBiasAndDequantize with MKL enabled. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.

CVE-2023-25671 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j5w9-hmfh-4cr6):

TensorFlow is an open source platform for machine learning. There is out-of-bounds access due to mismatched integer type sizes. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.

CVE-2023-25672 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-94mm-g2mv-8p7r):

TensorFlow is an open source platform for machine learning. The function `tf.raw_ops.LookupTableImportV2` cannot handle scalars in the `values` parameter and gives an NPE. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.

CVE-2023-25673 (https://github.com/tensorflow/tensorflow/commit/728113a3be690facad6ce436660a0bc1858017fa):

TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a Floating Point Exception in TensorListSplit with XLA. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.

CVE-2023-25674 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf97-q72m-7579):

TensorFlow is an open source machine learning platform. Versions prior to 2.12.0 and 2.11.1 have a null pointer error in RandomShuffle with XLA enabled. A fix is included in TensorFlow 2.12.0 and 2.11.1.

CVE-2023-25675 (https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7x4v-9gxg-9hwj):

TensorFlow is an open source machine learning platform. When running versions prior to 2.12.0 and 2.11.1 with XLA, `tf.raw_ops.Bincount` segfaults when given a parameter `weights` that is neither the same shape as parameter `arr` nor a length-0 tensor. A fix is included in TensorFlow 2.12.0 and 2.11.1.