Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-68v3-g9cm-rmm6: TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad

Impact

Out of bounds read in GRUBlockCellGrad

func = tf.raw_ops.GRUBlockCellGrad

para = {'x': [[21.1, 156.2], [83.3, 115.4]], 'h_prev': array([[136.5],
      [136.6]]), 'w_ru': array([[26.7,  0.8],
      [47.9, 26.1],
      [26.2, 26.3]]), 'w_c': array([[ 0.4],
      [31.5],
      [ 0.6]]), 'b_ru': array([0.1, 0.2 ], dtype=float32), 'b_c': 0x41414141, 'r': array([[0.3],
      [0.4]], dtype=float32), 'u': array([[5.7],
      [5.8]]), 'c': array([[52.9],
      [53.1]]), 'd_h': array([[172.2],
      [188.3 ]])}

Patches

We have patched the issue in GitHub commit ff459137c2716a2a60f7d441b855fcb466d778cb.

The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported by r3pwnx.

ghsa
#vulnerability#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-25658

TensorFlow vulnerable to Out-of-Bounds Read in GRUBlockCellGrad

Moderate severity GitHub Reviewed Published Mar 24, 2023 in tensorflow/tensorflow • Updated Mar 24, 2023

Package

pip tensorflow (pip)

Affected versions

< 2.11.1

Impact

Out of bounds read in GRUBlockCellGrad

func = tf.raw_ops.GRUBlockCellGrad

para = {’x’: [[21.1, 156.2], [83.3, 115.4]], 'h_prev’: array([[136.5], [136.6]]), 'w_ru’: array([[26.7, 0.8], [47.9, 26.1], [26.2, 26.3]]), 'w_c’: array([[ 0.4], [31.5], [ 0.6]]), 'b_ru’: array([0.1, 0.2 ], dtype=float32), 'b_c’: 0x41414141, 'r’: array([[0.3], [0.4]], dtype=float32), 'u’: array([[5.7], [5.8]]), 'c’: array([[52.9], [53.1]]), 'd_h’: array([[172.2], [188.3 ]])}

Patches

We have patched the issue in GitHub commit ff459137c2716a2a60f7d441b855fcb466d778cb.

The fix will be included in TensorFlow 2.12.0. We will also cherrypick this commit on TensorFlow 2.11.1

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported by r3pwnx.

References

  • GHSA-68v3-g9cm-rmm6
  • tensorflow/tensorflow@ff45913

Published to the GitHub Advisory Database

Mar 24, 2023

Last updated

Mar 24, 2023

Related news

CVE-2023-22062: Oracle Critical Patch Update Advisory - July 2023

Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).

CVE-2023-25658: OOB Read in GRUBlockCellGrad

TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, an out of bounds read is in GRUBlockCellGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1.