First published: Fri Nov 18 2022(Updated: )
TensorFlow is an open source platform for machine learning. If `ThreadUnsafeUnigramCandidateSampler` is given input `filterbank_channel_count` greater than the allowed max size, TensorFlow will crash. We have patched the issue in GitHub commit 39ec7eaf1428e90c37787e5b3fbd68ebd3c48860. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.8.4 | |
Google TensorFlow | >=2.9.0<2.9.3 | |
Google TensorFlow | >=2.10.0<2.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41896 is a vulnerability in TensorFlow where if `ThreadUnsafeUnigramCandidateSampler` is given input `filterbank_channel_count` greater than the allowed max size, TensorFlow will crash.
CVE-2022-41896 has a severity value of 7.5, which is considered high.
To fix CVE-2022-41896, you need to apply the patch provided in the GitHub commit 39ec7eaf1428e90c37787e5b3fbd68ebd3c48860.
The versions of TensorFlow affected by CVE-2022-41896 are 2.8.4, 2.9.0 to 2.9.3, and 2.10.0 to 2.10.1.
The Common Weakness Enumeration (CWE) ID for CVE-2022-41896 is CWE-1284 and CWE-20.