First published: Fri Nov 18 2022(Updated: )
TensorFlow is an open source platform for machine learning. If `BCast::ToShape` is given input larger than an `int32`, it will crash, despite being supposed to handle up to an `int64`. An example can be seen in `tf.experimental.numpy.outer` by passing in large input to the input `b`. We have patched the issue in GitHub commit 8310bf8dd188ff780e7fc53245058215a05bdbe5. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.8.4 | |
Google TensorFlow | >=2.9.0<2.9.3 | |
Google TensorFlow | >=2.10.0<2.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41890 is a vulnerability in TensorFlow, an open source platform for machine learning, where the `BCast::ToShape` function crashes when given input larger than an `int32`, despite being expected to handle up to an `int64`.
CVE-2022-41890 has a severity rating of high with a score of 7.5.
CVE-2022-41890 affects Google TensorFlow versions up to and including 2.8.4, 2.9.0 to 2.9.3, and 2.10.0 to 2.10.1.
To fix CVE-2022-41890, update your Google TensorFlow installation to version 2.8.5, 2.9.4, or 2.10.2, which contain the necessary patches.
You can find more information about CVE-2022-41890 on the following GitHub pages: [1] [2] [3].