CVE-2022-41891Improper Input Validation in Tensorflow

Severity
7.5HIGHNVD
CNA4.8
EPSS
0.2%
top 60.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 18
Latest updateNov 21

Description

TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListConcat` is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit fc33f3dc4c14051a83eec6535b608abe1d355fde. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/tensorflow2.9.02.9.3+2
CVEListV5tensorflow/tensorflow< 2.8.4+2
PyPIintel/optimization_for_tensorflow2.9.02.9.3+2

Patches

🔴Vulnerability Details

3
OSV
Segfault in `tf.raw_ops.TensorListConcat`2022-11-21
GHSA
Segfault in `tf.raw_ops.TensorListConcat`2022-11-21
CVEList
Segfault in `tf.raw_ops.TensorListConcat` in Tensorflow2022-11-18

📋Vendor Advisories

2
Microsoft
Segfault in `tf.raw_ops.TensorListConcat` in Tensorflow2022-11-08
Debian
CVE-2022-41891: tensorflow - TensorFlow is an open source platform for machine learning. If `tf.raw_ops.Tenso...2022
CVE-2022-41891 — Improper Input Validation | cvebase