aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Browse All

All tracked items across vulnerabilities, news, research, incidents, and regulatory updates.

to
Export CSV
3335 items

CVE-2022-0736: Insecure Temporary File in GitHub repository mlflow/mlflow prior to 1.23.1.

highvulnerability
security
Feb 23, 2022
CVE-2022-0736

MLflow, a machine learning platform, had an insecure temporary file vulnerability (CWE-377, a weakness where temporary files are created without proper security protections) in versions before 1.23.1. This vulnerability could potentially allow attackers to access or modify sensitive data stored in temporary files.

Fix: Update MLflow to version 1.23.1 or later. A patch is available at https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711.

NVD/CVE Database

CVE-2022-23595: Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23595

TensorFlow (an open source machine learning framework) has a vulnerability where building an XLA compilation cache (a storage system that speeds up machine learning model compilation) with default settings causes a null pointer dereference (a crash that happens when code tries to use a memory location that doesn't exist). This occurs because the default configuration allows all devices, leaving a critical variable empty.

CVE-2022-23594: Tensorflow is an Open Source Machine Learning Framework. The TFG dialect of TensorFlow (MLIR) makes several assumptions

highvulnerability
security
Feb 4, 2022
CVE-2022-23594

TensorFlow (an open-source machine learning framework) has a vulnerability in its TFG dialect, which is part of MLIR (a compiler framework for optimizing code). An attacker can modify the SavedModel format (the way trained models are saved to disk) to break assumptions the system makes, which can crash the Python interpreter or cause heap OOB (out-of-bounds memory access, where code reads or writes memory it shouldn't).

CVE-2022-23593: Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructur

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23593

TensorFlow, an open-source machine learning framework, has a vulnerability in its `simplifyBroadcast` function (a part of the MLIR-TFRT infrastructure, which is the compiler and runtime system) that causes a segfault (a crash from accessing invalid memory) when given scalar shapes (data without dimensions), resulting in a denial of service (making the system unavailable). This affects only TensorFlow version 2.7.0.

CVE-2022-23592: Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can cause a heap out of bounds read

highvulnerability
security
Feb 4, 2022
CVE-2022-23592

TensorFlow (an open-source machine learning framework) has a vulnerability where type inference can read data outside the bounds of allocated memory (a heap out of bounds read). The bounds checking uses a DCHECK, which is disabled in production code, allowing an attacker to manipulate a variable so it accesses memory beyond what is available.

CVE-2022-23591: Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursi

highvulnerability
security
Feb 4, 2022
CVE-2022-23591

TensorFlow (an open-source machine learning framework) has a vulnerability where the GraphDef format (TensorFlow's way of representing computation graphs) can accept self-recursive functions even though it shouldn't, causing a stack overflow (a crash from too much memory use) when the model runs because the system gets stuck trying to resolve the same function repeatedly.

CVE-2022-23590: Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `SavedModel` can be maliciously

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23590

TensorFlow (an open source machine learning framework) has a vulnerability where a maliciously altered GraphDef (a representation of a machine learning model's computation graph) from a SavedModel can crash a TensorFlow process by forcing extraction of a value from a StatusOr (a data structure that holds either a valid result or an error state). The issue affects both TensorFlow 2.7 and 2.8 versions.

CVE-2022-23589: Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can t

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23589

TensorFlow, a machine learning framework, has a vulnerability (CVE-2022-23589) in its Grappler component (a graph optimization tool) that can cause a null pointer dereference (crash from accessing invalid memory) when processing maliciously altered SavedModel files (serialized machine learning models). The bug occurs in two places during optimization operations and can be triggered by missing required nodes in the computation graph.

CVE-2022-23588: Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `S

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23588

A malicious user can crash TensorFlow (an open source machine learning framework) by modifying a SavedModel (a pre-trained model file) in a way that tricks the Grappler optimizer (a tool that improves model performance) into building a tensor with an invalid reference dtype (data type), causing the program to fail.

CVE-2022-23587: Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow is vu

highvulnerability
security
Feb 4, 2022
CVE-2022-23587

TensorFlow, an open-source machine learning framework, has a vulnerability in its Grappler component (a tool that optimizes computational graphs) that causes an integer overflow (when a number becomes too large to store) during cost estimation for crop and resize operations. Since attackers can control the cropping parameters, they can trigger undefined behavior (unpredictable actions that may crash the system or cause other problems).

CVE-2022-23586: Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `S

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23586

A vulnerability in TensorFlow (an open-source machine learning framework) allows an attacker to cause a denial of service by modifying a SavedModel (a packaged version of a trained model) in a way that triggers false assertions in the code and crashes the Python interpreter. This vulnerability affects multiple versions of TensorFlow.

CVE-2022-23585: Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorFlow can produce a memory leak i

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23585

TensorFlow, an open-source machine learning framework, has a memory leak (unused memory that is not freed) when decoding invalid PNG image files. The problem occurs because error-handling code exits the function early without properly freeing allocated buffers (chunks of memory that were set aside for use).

CVE-2022-23584: Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use after free behavior when decod

highvulnerability
security
Feb 4, 2022
CVE-2022-23584

TensorFlow (an open-source machine learning framework) has a vulnerability where a malicious user can trigger a use after free bug (accessing memory that has already been freed) when decoding PNG images. The problem occurs because after a memory cleanup function is called, the width and height values are left in an unpredictable state.

CVE-2022-23583: Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `S

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23583

A vulnerability in TensorFlow (an open-source machine learning framework) allows a malicious user to cause a denial of service (making a service unavailable) by modifying a SavedModel (a format for storing trained models) so that binary operations receive corrupted data due to type confusion (using data as if it were a different type than it actually is). This type mismatch between expected and actual data types can cause the program to crash.

CVE-2022-23582: Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `S

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23582

A vulnerability in TensorFlow (an open-source machine learning framework) allows attackers to cause a denial of service (making a service unavailable) by modifying a SavedModel (a serialized TensorFlow model) so that the TensorByteSize function crashes. The problem occurs because the TensorShape constructor crashes when it encounters partial shapes (incomplete dimension information) or very large numbers, instead of gracefully handling them like PartialTensorShape does.

CVE-2022-23581: Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a den

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23581

A vulnerability in TensorFlow (an open source machine learning framework) exists in the Grappler optimizer, which can be exploited to cause a denial of service (making a system unavailable by overloading it) by modifying a SavedModel file so that a function called IsSimplifiableReshape triggers CHECK failures (unexpected error conditions that crash the program).

CVE-2022-23580: Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFlow can allocate a large vector

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23580

TensorFlow, an open-source machine learning framework, has a vulnerability in its shape inference process where it can allocate a large vector based on user-controlled input, potentially causing uncontrolled resource consumption (using excessive memory or CPU). This happens because the system doesn't properly validate the size of data requested by users.

CVE-2022-23579: Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a den

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23579

TensorFlow (an open source machine learning framework) has a vulnerability in its Grappler optimizer (a tool that improves how machine learning models run) that allows attackers to cause a denial of service (making the system stop working) by modifying a SavedModel (a saved machine learning model) in a way that triggers crashes. This vulnerability affects multiple versions of TensorFlow.

CVE-2022-23578: Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, TensorFlow can leak memory in the i

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23578

TensorFlow (an open-source machine learning framework) has a memory leak bug in a function called `ImmutableExecutorState::Initialize`. When a graph node (a processing unit in a machine learning model) is invalid, the software sets a pointer (a reference to a location in memory) to null without freeing the memory it previously pointed to, causing that memory to be wasted and unavailable for other tasks.

CVE-2022-23577: Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caus

mediumvulnerability
security
Feb 4, 2022
CVE-2022-23577

TensorFlow, an open source machine learning framework, has a vulnerability in the `GetInitOp` function that can crash the software through a null pointer dereference (accessing memory that doesn't exist). The vulnerability affects multiple versions of TensorFlow.

Previous137 / 167Next

Fix: The fix will be included in TensorFlow 2.8.0. Patches will also be released in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database
NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be backported to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The issue has been patched in TensorFlow 2.8.0 and TensorFlow 2.7.1. Users should upgrade to these versions or later.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The patch will also be backported to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be applied to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. This commit will also be applied to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these versions are still supported.

NVD/CVE Database

Fix: Update to TensorFlow 2.8.0, or apply the fix through updates to TensorFlow 2.7.1, TensorFlow 2.6.3, or TensorFlow 2.5.3. Patches are available in the following commits: 3d89911481ba6ebe8c88c1c0b595412121e6c645 and dcc21c7bc972b10b6fb95c2fb0f4ab5a59680ec2.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be applied to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: Update to TensorFlow 2.8.0 or apply patches to the following supported versions: TensorFlow 2.7.1, TensorFlow 2.6.3, or TensorFlow 2.5.3. These versions contain the fix for this vulnerability.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be backported (adapted for older versions) to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. Additionally, the patch will be backported (applied to earlier versions still receiving support) to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. Patches will also be cherry-picked (backported to earlier versions) for TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, which are still in the supported range.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The vulnerability is also being patched in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, which are still in the supported range.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 will also receive the fix through a cherrypick (applying the same fix to older supported versions).

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be backported (applied to older versions still being supported) to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 will also receive this fix through a cherrypick (applying the same code change to older supported versions).

NVD/CVE Database