CVE-2022-41885Incorrect Calculation of Buffer Size in Tensorflow

Severity
7.5HIGHNVD
CNA4.8
EPSS
0.2%
top 63.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 18
Latest updateNov 21

Description

TensorFlow is an open source platform for machine learning. When `tf.raw_ops.FusedResizeAndPadConv2D` is given a large tensor shape, it overflows. We have patched the issue in GitHub commit d66e1d568275e6a2947de97dca7a102a211e01ce. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/tensorflow2.8.02.8.1+3
CVEListV5tensorflow/tensorflow< 2.7.4+2
PyPIintel/optimization_for_tensorflow2.8.02.8.1+2

Patches

🔴Vulnerability Details

3
OSV
Overflow in `FusedResizeAndPadConv2D`2022-11-21
GHSA
Overflow in `FusedResizeAndPadConv2D`2022-11-21
CVEList
Overflow in `FusedResizeAndPadConv2D` in Tensorflow2022-11-18

📋Vendor Advisories

1
Debian
CVE-2022-41885: tensorflow - TensorFlow is an open source platform for machine learning. When `tf.raw_ops.Fus...2022
CVE-2022-41885 — Incorrect Calculation of Buffer Size | cvebase