CVE-2022-41887Incorrect Calculation of Buffer Size in Tensorflow

Severity
7.5HIGHNVD
CNA4.8
EPSS
0.1%
top 66.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 18
Latest updateNov 21

Description

TensorFlow is an open source platform for machine learning. `tf.keras.losses.poisson` receives a `y_pred` and `y_true` that are passed through `functor::mul` in `BinaryOp`. If the resulting dimensions overflow an `int32`, TensorFlow will crash due to a size mismatch during broadcast assignment. We have patched the issue in GitHub commit c5b30379ba87cbe774b08ac50c1f6d36df4ebb7c. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1 and 2.9.3, as the

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/tensorflow2.9.02.9.3+1
CVEListV5tensorflow/tensorflow< 2.9.3+1
PyPIintel/optimization_for_tensorflow2.10.02.10.1+1

Patches

🔴Vulnerability Details

3
GHSA
Overflow in `tf.keras.losses.poisson`2022-11-21
OSV
Overflow in `tf.keras.losses.poisson`2022-11-21
CVEList
Overflow in `tf.keras.losses.poisson` in Tensorflow2022-11-18

📋Vendor Advisories

1
Debian
CVE-2022-41887: tensorflow - TensorFlow is an open source platform for machine learning. `tf.keras.losses.poi...2022
CVE-2022-41887 — Incorrect Calculation of Buffer Size | cvebase