CVE-2022-41894Classic Buffer Overflow in Tensorflow

Severity
8.1HIGHNVD
CNA7.1
EPSS
0.2%
top 56.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 18
Latest updateNov 21

Description

TensorFlow is an open source platform for machine learning. The reference kernel of the `CONV_3D_TRANSPOSE` TensorFlow Lite operator wrongly increments the data_ptr when adding the bias to the result. Instead of `data_ptr += num_channels;` it should be `data_ptr += output_num_channels;` as if the number of input channels is different than the number of output channels, the wrong result will be returned and a buffer overflow will occur if num_channels > output_num_channels. An attacker can craft

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages3 packages

NVDgoogle/tensorflow2.9.02.9.3+2
CVEListV5tensorflow/tensorflow< 2.8.4+2
PyPIintel/optimization_for_tensorflow2.9.02.9.3+2

Patches

🔴Vulnerability Details

3
OSV
Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite2022-11-21
GHSA
Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite2022-11-21
CVEList
Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite2022-11-18

📋Vendor Advisories

2
Microsoft
Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite2022-11-08
Debian
CVE-2022-41894: tensorflow - TensorFlow is an open source platform for machine learning. The reference kernel...2022
CVE-2022-41894 — Classic Buffer Overflow in Tensorflow | cvebase