First published: Fri Nov 18 2022(Updated: )
TensorFlow is an open source platform for machine learning. When `tf.raw_ops.ImageProjectiveTransformV2` is given a large output shape, it overflows. We have patched the issue in GitHub commit 8faa6ea692985dbe6ce10e1a3168e0bd60a723ba. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.8.4 | |
Google TensorFlow | >=2.9.0<2.9.3 | |
Google TensorFlow | =2.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41886 is a vulnerability in TensorFlow where `tf.raw_ops.ImageProjectiveTransformV2` overflows when given a large output shape.
The severity of CVE-2022-41886 is high with a CVSS score of 7.5.
TensorFlow versions 2.8.4, 2.9.0 to 2.9.3, and 2.10.0 are affected by CVE-2022-41886.
The issue has been patched in GitHub commit 8faa6ea692985dbe6ce10e1a3168e0bd60a723ba and the fix will be included in TensorFlow 2.11. It is recommended to update to the latest version when available.
More information about CVE-2022-41886 can be found in the following references: [GitHub Commit](https://github.com/tensorflow/tensorflow/commit/8faa6ea692985dbe6ce10e1a3168e0bd60a723ba), [GitHub Security Advisory](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-54pp-c6pp-7fpx).