{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2022-21728","title":"Title"},{"category":"description","text":"Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values. Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of the array), however if the value is too negative then the implementation of `Dim` would access elements before the start of an array. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2022-21728","url":"https://www.suse.com/security/cve/CVE-2022-21728"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1195545 for CVE-2022-21728","url":"https://bugzilla.suse.com/1195545"}],"title":"SUSE CVE CVE-2022-21728","tracking":{"current_release_date":"2025-03-15T07:49:15Z","generator":{"date":"2023-02-15T03:29:03Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2022-21728","initial_release_date":"2023-02-15T03:29:03Z","revision_history":[{"date":"2023-02-15T03:29:03Z","number":"2","summary":"Current version"},{"date":"2025-01-01T03:17:09Z","number":"3","summary":"Current version"},{"date":"2025-02-14T08:01:54Z","number":"4","summary":"Current version"},{"date":"2025-02-16T07:44:32Z","number":"5","summary":"Current version"},{"date":"2025-03-15T07:49:15Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"tensorflow-lite-2.9.1-1.1","product":{"name":"tensorflow-lite-2.9.1-1.1","product_id":"tensorflow-lite-2.9.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/tensorflow-lite@2.9.1-1.1"}}},{"category":"product_version","name":"tensorflow-lite-devel-2.9.1-1.1","product":{"name":"tensorflow-lite-devel-2.9.1-1.1","product_id":"tensorflow-lite-devel-2.9.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/tensorflow-lite-devel@2.9.1-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"tensorflow-lite-2.9.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tensorflow-lite-2.9.1-1.1"},"product_reference":"tensorflow-lite-2.9.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tensorflow-lite-devel-2.9.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tensorflow-lite-devel-2.9.1-1.1"},"product_reference":"tensorflow-lite-devel-2.9.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2022-21728","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-21728"}],"notes":[{"category":"general","text":"Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values. Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of the array), however if the value is too negative then the implementation of `Dim` would access elements before the start of an array. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tensorflow-lite-2.9.1-1.1","openSUSE Tumbleweed:tensorflow-lite-devel-2.9.1-1.1"]},"references":[{"category":"external","summary":"CVE-2022-21728","url":"https://www.suse.com/security/cve/CVE-2022-21728"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1195545 for CVE-2022-21728","url":"https://bugzilla.suse.com/1195545"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tensorflow-lite-2.9.1-1.1","openSUSE Tumbleweed:tensorflow-lite-devel-2.9.1-1.1"]}],"scores":[{"cvss_v3":{"baseScore":8.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:tensorflow-lite-2.9.1-1.1","openSUSE Tumbleweed:tensorflow-lite-devel-2.9.1-1.1"]}],"threats":[{"category":"impact","date":"2022-02-04T09:30:25Z","details":"critical"}],"title":"CVE-2022-21728"}]}