PyPi: Openvino-Tensorflow

CVE-2022-29216

Transitive

Safety vulnerability ID: 50208

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 21, 2022 Updated at Nov 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Openvino-tensorflow 2.1.0 updates its dependency 'TensorFlow' to v2.9.1 to include security fixes.

Affected package

openvino-tensorflow

Latest version: 2.3.0

OpenVINO™ integration with TensorFlow

Affected versions

Fixed versions

Vulnerability changelog

This release provides performance improvements and functional bug fixes from the previous release.

- Performance Optimizations of existing supported models
- Updated opset support to OpenVINO™ opset8
- Dynamic shape support enabled for multiple ops, which resulted in larger cluster sizes and performance improvement
- Added support for following TensorFlow Ops in **OpenVINO™ integration with TensorFlow**: CTCGreedyDecoder, SparseToDense, BatchMatMulV2, BatchMatMul, SquaredDifference, LessEqual, NotEqual, Cumsum

- TensorFlow version upgraded to 2.9.1. It provides bug fixes and addresses vulnerabilities over TensorFlow 2.8.0

- Docker Support
- **OpenVINO™ integration with TensorFlow** Runtime Dockerfiles for Ubuntu 18.04 and Ubuntu 20.04 are updated
- **OpenVINO™ integration with TensorFlow** Runtime Dockerfiles with **TF-Serving** for Ubuntu 18.04 and Ubuntu 20.04 are updated
- Prebuilt images are updated and can be found on [Docker Hub](https://hub.docker.com/r/openvino/openvino_tensorflow_ubuntu20_runtime)

- Enhanced GitHub documentation

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.8

CVSS v3 Details

HIGH 7.8
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
HIGH
Availability Availability (A)
HIGH

CVSS v2 Details

MEDIUM 4.6
Access Vector (AV)
LOCAL
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
PARTIAL
Integrity Impact (I)
PARTIAL
Availability Impact (A)
PARTIAL