First published: Fri Nov 18 2022(Updated: )
TensorFlow is an open source platform for machine learning. When `tf.raw_ops.FusedResizeAndPadConv2D` is given a large tensor shape, it overflows. We have patched the issue in GitHub commit d66e1d568275e6a2947de97dca7a102a211e01ce. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.7.4 | |
Google TensorFlow | >=2.8.0<2.8.1 | |
Google TensorFlow | >=2.9.0<2.9.1 | |
Google TensorFlow | =2.10.0-rc0 | |
Google TensorFlow | =2.10.0-rc1 | |
Google TensorFlow | =2.10.0-rc2 | |
Google TensorFlow | =2.10.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41885 is a vulnerability in TensorFlow that causes an overflow when `tf.raw_ops.FusedResizeAndPadConv2D` is given a large tensor shape.
The severity of CVE-2022-41885 is high with a CVSS score of 7.5.
The versions affected by CVE-2022-41885 are TensorFlow 2.7.4, 2.8.0 to 2.8.1, 2.9.0 to 2.9.1, 2.10.0-rc0, 2.10.0-rc1, 2.10.0-rc2, and 2.10.0-rc3.
To fix CVE-2022-41885, update to TensorFlow 2.11 or later, which includes the patch for the vulnerability.
You can find more information about CVE-2022-41885 in the following references: [GitHub ConvOpsFusedImageTransform.cc](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/conv_ops_fused_image_transform.cc), [GitHub Commit d66e1d568275e6a2947de97dca7a102a211e01ce](https://github.com/tensorflow/tensorflow/commit/d66e1d568275e6a2947de97dca7a102a211e01ce), [GitHub Security Advisory GHSA-762h-vpvw-3rcx](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-762h-vpvw-3rcx).