First published: Fri Nov 18 2022(Updated: )
### Impact If a list of quantized tensors is assigned to an attribute, the pywrap code fails to parse the tensor and returns a `nullptr`, which is not caught. An example can be seen in [`tf.compat.v1.extract_volume_patches`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/generate_box_proposals_op.cu.cc) by passing in quantized tensors as input `ksizes`. ```python import numpy as np import tensorflow as tf a_input = np.array([1, -1], dtype= np.int32) a_ksizes = a_strides = tf.constant(dtype=tf.dtypes.qint16, value=[[1, 4], [5, 2]]) tf.compat.v1.extract_volume_patches(input=a_input,ksizes=a_ksizes,strides=a_strides,padding='VALID') ``` ### Patches We have patched the issue in GitHub commit [e9e95553e5411834d215e6770c81a83a3d0866ce](https://github.com/tensorflow/tensorflow/commit/e9e95553e5411834d215e6770c81a83a3d0866ce). The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Pattarakrit Rattankul.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/tensorflow-gpu | >=2.10.0<2.10.1 | 2.10.1 |
pip/tensorflow-cpu | >=2.10.0<2.10.1 | 2.10.1 |
pip/tensorflow-gpu | >=2.9.0<2.9.3 | 2.9.3 |
pip/tensorflow-cpu | >=2.9.0<2.9.3 | 2.9.3 |
pip/tensorflow-gpu | <2.8.4 | 2.8.4 |
pip/tensorflow-cpu | <2.8.4 | 2.8.4 |
pip/tensorflow | >=2.10.0<2.10.1 | 2.10.1 |
pip/tensorflow | >=2.9.0<2.9.3 | 2.9.3 |
pip/tensorflow | <2.8.4 | 2.8.4 |
TensorFlow Keras | <2.8.4 | |
TensorFlow Keras | >=2.9.0<2.9.3 | |
TensorFlow Keras | >=2.10.0<2.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41889 is a vulnerability in TensorFlow, an open source platform for machine learning, where a list of quantized tensors assigned to an attribute can cause the pywrap code to fail, leading to a null pointer exception.
CVE-2022-41889 affects Google TensorFlow versions up to and including 2.8.4, versions 2.9.0 to 2.9.3, and versions 2.10.0 to 2.10.1.
CVE-2022-41889 has a severity rating of 7.5 (High).
To fix CVE-2022-41889, it is recommended to update to a version of Google TensorFlow that is not affected by the vulnerability.
More information about CVE-2022-41889 can be found in the TensorFlow GitHub repository and the TensorFlow security advisories.