Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateOutputSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve tensors with large enough number of elements. We can have a large enough number of dimensions in `output_shape.dim()` or just a small number of dimensions being large enough to cause an overflow in the multiplication. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References
Link | Resource |
---|---|
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617 | Exploit Third Party Advisory |
https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37 | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617 | Exploit Third Party Advisory |
https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617 - Exploit, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae - Patch, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37 - Patch, Third Party Advisory |
Information
Published : 2022-02-04 23:15
Updated : 2024-11-21 06:48
NVD link : CVE-2022-23576
Mitre link : CVE-2022-23576
CVE.ORG link : CVE-2022-23576
JSON object : View
Products Affected
- tensorflow
CWE
CWE-190
Integer Overflow or Wraparound