First published: Fri Sep 16 2022(Updated: )
TensorFlow is an open source platform for machine learning. The `GatherNd` function takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. This issue has been patched in GitHub commit 4142e47e9e31db481781b955ed3ff807a781b494. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
TensorFlow Keras | >=2.7.0<2.7.2 | |
TensorFlow Keras | >=2.8.0<2.8.1 | |
TensorFlow Keras | >=2.9.0<2.9.1 | |
TensorFlow Keras | =2.10-rc0 | |
TensorFlow Keras | =2.10-rc1 | |
TensorFlow Keras | =2.10-rc2 | |
TensorFlow Keras | =2.10-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35938 is considered to have high severity due to the potential for out-of-bounds memory reads or crashes.
To fix CVE-2022-35938, upgrade TensorFlow to a version that is not affected, specifically 2.10-rc4 or later.
CVE-2022-35938 affects TensorFlow versions from 2.7.0 to 2.9.1, as well as the 2.10 release candidates RC0 to RC3.
The vulnerability affects the 'GatherNd' function in TensorFlow by causing an out-of-bounds memory issue.
There are no known workarounds for CVE-2022-35938, so upgrading to a fixed version is recommended.