CVE-2022-41911

CWE-7046 documents6 sources
Severity
7.5HIGH
EPSS
0.1%
top 64.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 18
Latest updateNov 21

Description

TensorFlow is an open source platform for machine learning. When printing a tensor, we get it's data as a `const char*` array (since that's the underlying storage) and then we typecast it to the element type. However, conversions from `char` to `bool` are undefined if the `char` is not `0` or `1`, so sanitizers/fuzzers will crash. The issue has been patched in GitHub commit `1be74370327`. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.10.1, Ten

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:HExploitability: 1.2 | Impact: 3.6

Affected Packages5 packages

PyPItensorflow2.9.02.9.3+2
PyPItensorflow-cpu2.9.02.9.3+2
PyPItensorflow-gpu2.10.02.10.1+2
NVDgoogle/tensorflow2.9.02.9.3+2
CVEListV5tensorflow/tensorflow< 2.8.4+2

Patches

🔴Vulnerability Details

3
OSV
Invalid char to bool conversion when printing a tensor2022-11-21
GHSA
Invalid char to bool conversion when printing a tensor2022-11-21
CVEList
Invalid char to bool conversion when printing a tensor in Tensorflow2022-11-18

📋Vendor Advisories

2
Microsoft
Invalid char to bool conversion when printing a tensor in Tensorflow2022-11-08
Debian
CVE-2022-41911: tensorflow - TensorFlow is an open source platform for machine learning. When printing a tens...2022
CVE-2022-41911 (HIGH CVSS 7.5) | TensorFlow is an open source platfo | cvebase.io