Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-mv77-9g28-cwg3: `CHECK` fail via inputs in `PyFunc`

Impact

An input token that is not a UTF-8 bytestring will trigger a CHECK fail in tf.raw_ops.PyFunc.

import tensorflow as tf

value = tf.constant(value=[1,2])
token = b'\xb0'
dataType = [tf.int32]

tf.raw_ops.PyFunc(input=value,token=token,Tout=dataType)

Patches

We have patched the issue in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645.

The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported by [email protected]

ghsa
#vulnerability#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2022-41908

`CHECK` fail via inputs in `PyFunc`

Moderate severity GitHub Reviewed Published Nov 21, 2022 in tensorflow/tensorflow

Vulnerability details Dependabot alerts 0

Package

pip tensorflow (pip)

Affected versions

< 2.8.4

>= 2.9.0, < 2.9.3

>= 2.10.0, < 2.10.1

Patched versions

2.8.4

2.9.3

2.10.1

pip tensorflow-cpu (pip)

< 2.8.4

>= 2.9.0, < 2.9.3

>= 2.10.0, < 2.10.1

2.8.4

2.9.3

2.10.1

pip tensorflow-gpu (pip)

< 2.8.4

>= 2.9.0, < 2.9.3

>= 2.10.0, < 2.10.1

2.8.4

2.9.3

2.10.1

Description

Impact

An input token that is not a UTF-8 bytestring will trigger a CHECK fail in tf.raw_ops.PyFunc.

import tensorflow as tf

value = tf.constant(value=[1,2]) token = b’\xb0’ dataType = [tf.int32]

tf.raw_ops.PyFunc(input=value,token=token,Tout=dataType)

Patches

We have patched the issue in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645.

The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported by [email protected]

References

  • GHSA-mv77-9g28-cwg3
  • https://nvd.nist.gov/vuln/detail/CVE-2022-41908
  • tensorflow/tensorflow@9f03a9d
  • https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc

pak-laura published the maintainer security advisory

Nov 18, 2022

Severity

Moderate

4.8

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

High

Privileges required

Low

User interaction

Required

Scope

Unchanged

Confidentiality

None

Integrity

None

Availability

High

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H

Weaknesses

CWE-20

CVE ID

CVE-2022-41908

GHSA ID

GHSA-mv77-9g28-cwg3

Source code

tensorflow/tensorflow

Checking history

See something to contribute? Suggest improvements for this vulnerability.

Related news

CVE-2022-41908: Replace CHECK with returning an InternalError on failing to create py… · tensorflow/tensorflow@9f03a9d

TensorFlow is an open source platform for machine learning. An input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in `tf.raw_ops.PyFunc`. We have patched the issue in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.