CVE-2022-36022 (GCVE-0-2022-36022)
Vulnerability from cvelistv5
Published
2022-11-10 00:00
Modified
2025-04-23 16:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-344 - Use of Invariant Value in Dynamically Changing Context
Summary
Deeplearning4J is a suite of tools for deploying and training deep learning models using the JVM. Packages org.deeplearning4j:dl4j-examples and org.deeplearning4j:platform-tests through version 1.0.0-M2.1 may use some unclaimed S3 buckets in tests in examples. This is likely affect people who use some older NLP examples that reference an old S3 bucket. The problem has been patched. Users should upgrade to snapshots as Deeplearning4J plan to publish a release with the fix at a later date. As a workaround, download a word2vec google news vector from a new source using git lfs from here.
References
► | URL | Tags | |
---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
eclipse | deeplearning4j |
Version: <= 1.0.0-M2.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:51:59.879Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/eclipse/deeplearning4j/security/advisories/GHSA-rc39-g977-687w" }, { "tags": [ "x_transferred" ], "url": "https://github.com/mmihaltz/word2vec-GoogleNews-vectors" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-36022", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T15:49:06.754394Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:39:29.662Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "deeplearning4j", "vendor": "eclipse", "versions": [ { "status": "affected", "version": "\u003c= 1.0.0-M2.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Deeplearning4J is a suite of tools for deploying and training deep learning models using the JVM. Packages org.deeplearning4j:dl4j-examples and org.deeplearning4j:platform-tests through version 1.0.0-M2.1 may use some unclaimed S3 buckets in tests in examples. This is likely affect people who use some older NLP examples that reference an old S3 bucket. The problem has been patched. Users should upgrade to snapshots as Deeplearning4J plan to publish a release with the fix at a later date. As a workaround, download a word2vec google news vector from a new source using git lfs from here." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-344", "description": "CWE-344: Use of Invariant Value in Dynamically Changing Context", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-10T00:00:00.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/eclipse/deeplearning4j/security/advisories/GHSA-rc39-g977-687w" }, { "url": "https://github.com/mmihaltz/word2vec-GoogleNews-vectors" } ], "source": { "advisory": "GHSA-rc39-g977-687w", "discovery": "UNKNOWN" }, "title": "Some Deeplearning4J packages use unclaimed s3 bucket in tests and examples" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-36022", "datePublished": "2022-11-10T00:00:00.000Z", "dateReserved": "2022-07-15T00:00:00.000Z", "dateUpdated": "2025-04-23T16:39:29.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-36022\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-11-10T18:15:10.577\",\"lastModified\":\"2024-11-21T07:12:12.230\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Deeplearning4J is a suite of tools for deploying and training deep learning models using the JVM. Packages org.deeplearning4j:dl4j-examples and org.deeplearning4j:platform-tests through version 1.0.0-M2.1 may use some unclaimed S3 buckets in tests in examples. This is likely affect people who use some older NLP examples that reference an old S3 bucket. The problem has been patched. Users should upgrade to snapshots as Deeplearning4J plan to publish a release with the fix at a later date. As a workaround, download a word2vec google news vector from a new source using git lfs from here.\"},{\"lang\":\"es\",\"value\":\"Deeplearning4J es un conjunto de herramientas para implementar y entrenar modelos de aprendizaje profundo utilizando JVM. Los paquetes org.deeplearning4j:dl4j-examples y org.deeplearning4j:platform-tests hasta la versi\u00f3n 1.0.0-M2.1 pueden usar algunos dep\u00f3sitos S3 no reclamados en las pruebas de los ejemplos. Es probable que esto afecte a las personas que usan algunos ejemplos de PNL m\u00e1s antiguos que hacen referencia a un antiguo dep\u00f3sito de S3. El problema ha sido solucionado. Los usuarios deben actualizar a instant\u00e1neas ya que Deeplearning4J planea publicar una versi\u00f3n con la soluci\u00f3n en una fecha posterior. Como workaround, descargue un vector de noticias de Google en word2vec desde una nueva fuente usando git lfs desde aqu\u00ed.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-344\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-330\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:deeplearning4j:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0\",\"matchCriteriaId\":\"FD3D16C3-A400-44D7-8F08-CFFAA077D93B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:deeplearning4j:1.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"960F59B9-17D7-42D7-AC7C-7233278CED70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:deeplearning4j:1.0.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D985D5-9D45-4857-83FF-367D9C0E3A98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:deeplearning4j:1.0.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"69AB64A7-1B91-435A-ABAE-4C9F049E9ECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:deeplearning4j:1.0.0:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F30DDBC9-A872-4D0D-A0AB-F6D1522533CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:deeplearning4j:1.0.0:milestone1.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E69D9455-41CB-48EB-8A44-1DC89E0814C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:deeplearning4j:1.0.0:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB0AB8DC-F008-4A5C-A3B6-36C3CCCD0AD8\"}]}]}],\"references\":[{\"url\":\"https://github.com/eclipse/deeplearning4j/security/advisories/GHSA-rc39-g977-687w\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/mmihaltz/word2vec-GoogleNews-vectors\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/eclipse/deeplearning4j/security/advisories/GHSA-rc39-g977-687w\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/mmihaltz/word2vec-GoogleNews-vectors\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…