logo

CVE-2022-41911 tensorflow-gpu

Package

Manager: pip
Name: tensorflow-gpu
Vulnerable Version: >=2.10.0 <2.10.1 || >=0 <2.8.4 || >=2.9.0 <2.9.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00084 pctl0.25386

Details

Invalid char to bool conversion when printing a tensor ### Impact When [printing a tensor](https://github.com/tensorflow/tensorflow/blob/807cae8a807960fd7ac2313cde73a11fc15e7942/tensorflow/core/framework/tensor.cc#L1200-L1227), we get it's data as a `const char*` array (since that's the underlying storage) and then we typecast it to the element type. However, conversions from `char` to `bool` are undefined if the `char` is not `0` or `1`, so sanitizers/fuzzers will crash. ### Patches We have patched the issue in GitHub commit [1be743703279782a357adbf9b77dcb994fe8b508](https://github.com/tensorflow/tensorflow/commit/1be743703279782a357adbf9b77dcb994fe8b508). The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.10.1, TensorFlow 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability was discovered via internal fuzzing.

Metadata

Created: 2022-11-21T22:18:11Z
Modified: 2022-11-21T22:18:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-pf36-r9c6-h97j/GHSA-pf36-r9c6-h97j.json
CWE IDs: ["CWE-704"]
Alternative ID: GHSA-pf36-r9c6-h97j
Finding: F113
Auto approve: 1