Killy85 / game_ai_trainer

This repository is home of a Machine Learning project aiming at training an agent to play a game using Reinforcement learning
Apache License 2.0
0 stars 0 forks source link

CVE-2023-25661 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl #443

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2023-25661 - Medium Severity Vulnerability

Vulnerable Library - tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl

TensorFlow is an open source machine learning framework for everyone.

Library home page: https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl

Path to dependency file: /game_ai_trainer/requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy: - :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

TensorFlow is an Open Source Machine Learning Framework. In versions prior to 2.11.1 a malicious invalid input crashes a tensorflow model (Check Failed) and can be used to trigger a denial of service attack. A proof of concept can be constructed with the `Convolution3DTranspose` function. This Convolution3DTranspose layer is a very common API in modern neural networks. The ML models containing such vulnerable components could be deployed in ML applications or as cloud services. This failure could be potentially used to trigger a denial of service attack on ML cloud services. An attacker must have privilege to provide input to a `Convolution3DTranspose` call. This issue has been patched and users are advised to upgrade to version 2.11.1. There are no known workarounds for this vulnerability.

Publish Date: 2023-03-27

URL: CVE-2023-25661

CVSS 3 Score Details (6.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxgc-95xx-grvq

Release Date: 2023-03-27

Fix Resolution: 2.11.1


Step up your Open Source Security Game with Mend here