CVE-2022-41907Incorrect Calculation of Buffer Size in Tensorflow

Severity
7.5HIGHNVD
CNA4.8
EPSS
0.1%
top 65.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 18
Latest updateNov 21

Description

TensorFlow is an open source platform for machine learning. When `tf.raw_ops.ResizeNearestNeighborGrad` is given a large `size` input, it overflows. We have patched the issue in GitHub commit 00c821af032ba9e5f5fa3fe14690c8d28a657624. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/tensorflow2.9.02.9.3+2
CVEListV5tensorflow/tensorflow< 2.8.4+2
PyPIintel/optimization_for_tensorflow2.9.02.9.3+2

Patches

🔴Vulnerability Details

3
OSV
Overflow in `ResizeNearestNeighborGrad`2022-11-21
GHSA
Overflow in `ResizeNearestNeighborGrad`2022-11-21
CVEList
Overflow in `ResizeNearestNeighborGrad` in Tensorflow2022-11-18

📋Vendor Advisories

2
Microsoft
Overflow in `ResizeNearestNeighborGrad` in Tensorflow2022-11-08
Debian
CVE-2022-41907: tensorflow - TensorFlow is an open source platform for machine learning. When `tf.raw_ops.Res...2022
CVE-2022-41907 — Incorrect Calculation of Buffer Size | cvebase