CVE-2022-21728 – tensorflow
Package
Manager: pip
Name: tensorflow
Vulnerable Version: >=0 <2.5.3 || >=2.6.0 <2.6.3 || =2.7.0 || >=2.7.0 <2.7.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.01124 pctl0.77439
Details
Out of bounds read in Tensorflow ### Impact The [implementation of shape inference for `ReverseSequence`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671) does not fully validate the value of `batch_dim` and can result in a heap OOB read: ```python import tensorflow as tf @tf.function def test(): y = tf.raw_ops.ReverseSequence( input = ['aaa','bbb'], seq_lengths = [1,1,1], seq_dim = -10, batch_dim = -10 ) return y test() ``` There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values: ```cc const int32_t input_rank = c->Rank(input); if (batch_dim >= input_rank) { return errors::InvalidArgument( "batch_dim must be < input rank: ", batch_dim, " vs. ", input_rank); } // ... DimensionHandle batch_dim_dim = c->Dim(input, batch_dim); ``` Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of the array), however if the value is too negative then [the implementation of `Dim`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/shape_inference.h#L415-L428) would access elements before the start of an array: ```cc DimensionHandle Dim(ShapeHandle s, int64_t idx) { if (!s.Handle() || s->rank_ == kUnknownRank) { return UnknownDim(); } return DimKnownRank(s, idx); } · static DimensionHandle DimKnownRank(ShapeHandle s, int64_t idx) { CHECK_NE(s->rank_, kUnknownRank); if (idx < 0) { return s->dims_[s->dims_.size() + idx]; } return s->dims_[idx]; } ``` ### Patches We have patched the issue in GitHub commit [37c01fb5e25c3d80213060460196406c43d31995](https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
Metadata
Created: 2022-02-09T18:29:24Z
Modified: 2024-11-13T22:10:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-6gmv-pjp9-p8w8/GHSA-6gmv-pjp9-p8w8.json
CWE IDs: ["CWE-125"]
Alternative ID: GHSA-6gmv-pjp9-p8w8
Finding: F111
Auto approve: 1