Headline
GHSA-mv77-9g28-cwg3: `CHECK` fail via inputs in `PyFunc`
Impact
An input token
that is not a UTF-8 bytestring will trigger a CHECK
fail in tf.raw_ops.PyFunc
.
import tensorflow as tf
value = tf.constant(value=[1,2])
token = b'\xb0'
dataType = [tf.int32]
tf.raw_ops.PyFunc(input=value,token=token,Tout=dataType)
Patches
We have patched the issue in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645.
The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by [email protected]
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2022-41908
`CHECK` fail via inputs in `PyFunc`
Moderate severity GitHub Reviewed Published Nov 21, 2022 in tensorflow/tensorflow
Vulnerability details Dependabot alerts 0
Package
pip tensorflow (pip)
Affected versions
< 2.8.4
>= 2.9.0, < 2.9.3
>= 2.10.0, < 2.10.1
Patched versions
2.8.4
2.9.3
2.10.1
pip tensorflow-cpu (pip)
< 2.8.4
>= 2.9.0, < 2.9.3
>= 2.10.0, < 2.10.1
2.8.4
2.9.3
2.10.1
pip tensorflow-gpu (pip)
< 2.8.4
>= 2.9.0, < 2.9.3
>= 2.10.0, < 2.10.1
2.8.4
2.9.3
2.10.1
Description
Impact
An input token that is not a UTF-8 bytestring will trigger a CHECK fail in tf.raw_ops.PyFunc.
import tensorflow as tf
value = tf.constant(value=[1,2]) token = b’\xb0’ dataType = [tf.int32]
tf.raw_ops.PyFunc(input=value,token=token,Tout=dataType)
Patches
We have patched the issue in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645.
The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by [email protected]
References
- GHSA-mv77-9g28-cwg3
- https://nvd.nist.gov/vuln/detail/CVE-2022-41908
- tensorflow/tensorflow@9f03a9d
- https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc
pak-laura published the maintainer security advisory
Nov 18, 2022
Severity
Moderate
4.8
/ 10
CVSS base metrics
Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
Weaknesses
CWE-20
CVE ID
CVE-2022-41908
GHSA ID
GHSA-mv77-9g28-cwg3
Source code
tensorflow/tensorflow
Checking history
See something to contribute? Suggest improvements for this vulnerability.
Related news
TensorFlow is an open source platform for machine learning. An input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in `tf.raw_ops.PyFunc`. We have patched the issue in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.