First published: Fri May 20 2022(Updated: )
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, TensorFlow's `saved_model_cli` tool is vulnerable to a code injection. This can be used to open a reverse shell. This code path was maintained for compatibility reasons as the maintainers had several test cases where numpy expressions were used as arguments. However, given that the tool is always run manually, the impact of this is still not severe. The maintainers have now removed the `safe=False` argument, so all parsing is done without calling `eval`. The patch is available in versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
TensorFlow Keras | <2.6.4 | |
TensorFlow Keras | >=2.7.0<2.7.2 | |
TensorFlow Keras | =2.7.0-rc0 | |
TensorFlow Keras | =2.7.0-rc1 | |
TensorFlow Keras | =2.8.0 | |
TensorFlow Keras | =2.8.0-rc0 | |
TensorFlow Keras | =2.8.0-rc1 | |
TensorFlow Keras | =2.9.0-rc0 | |
TensorFlow Keras | =2.9.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29216 has been classified with a high severity rating due to its potential for code injection and reverse shell access.
To fix CVE-2022-29216, upgrade TensorFlow to version 2.9.0 or later, or any of the patched versions 2.8.1, 2.7.2, or 2.6.4.
CVE-2022-29216 affects TensorFlow versions prior to 2.9.0, 2.8.1, 2.7.2, and 2.6.4.
CVE-2022-29216 can facilitate a code injection attack, allowing an attacker to execute arbitrary commands via a reverse shell.
Yes, CVE-2022-29216 specifically affects the 'saved_model_cli' tool in TensorFlow, leading to potential exploits.