CVE-2022-35935 (CNNVD-202209-1332)
中文标题:
Google TensorFlow 安全漏洞
英文标题:
`CHECK` failure in `SobolSample` via missing validation in TensorFlow
漏洞描述
中文描述:
Google TensorFlow是美国谷歌(Google)公司的一套用于机器学习的端到端开源平台。 Google TensorFlow 存在安全漏洞,该漏洞源于容易受到因断言失败导致的拒绝服务攻击。该漏洞将在 2.10.0 版本, 2.9.1 版本, 2.8.1 版本, 2.7.2 版本中得到修复。
英文描述:
TensorFlow is an open source platform for machine learning. The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. This issue has been patched in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| tensorflow | tensorflow | < 2.7.2 | - | - |
cpe:2.3:a:tensorflow:tensorflow:<_2.7.2:*:*:*:*:*:*:*
|
| tensorflow | tensorflow | >= 2.8.0, < 2.8.1 | - | - |
cpe:2.3:a:tensorflow:tensorflow:>=_2.8.0,_<_2.8.1:*:*:*:*:*:*:*
|
| tensorflow | tensorflow | >= 2.9.0, < 2.9.1 | - | - |
cpe:2.3:a:tensorflow:tensorflow:>=_2.9.0,_<_2.9.1:*:*:*:*:*:*:*
|
| tensorflow | * | - | - |
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
|
|
| tensorflow | 2.10 | - | - |
cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2022-35935 |
2025-11-11 15:21:30 | 2025-11-11 07:37:38 |
| NVD | nvd_CVE-2022-35935 |
2025-11-11 14:58:24 | 2025-11-11 07:45:52 |
| CNNVD | cnnvd_CNNVD-202209-1332 |
2025-11-11 15:11:00 | 2025-11-11 07:57:31 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202209-1332
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 3 -> 5
- data_sources: ['cve'] -> ['cve', 'nvd']