First published: Fri Nov 18 2022(Updated: )
TensorFlow is an open source platform for machine learning. An input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in `tf.raw_ops.PyFunc`. We have patched the issue in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.8.4 | |
Google TensorFlow | >=2.9.0<2.9.3 | |
Google TensorFlow | =2.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this TensorFlow issue is CVE-2022-41908.
The severity level of CVE-2022-41908 is high (7.5).
The vulnerability in TensorFlow allows an input `token` that is not a UTF-8 bytestring to trigger a `CHECK` fail in `tf.raw_ops.PyFunc`.
Versions 2.8.4, 2.9.0 to 2.9.3, and 2.10.0 of TensorFlow are affected by CVE-2022-41908.
The issue has been patched in GitHub commit 9f03a9d3bafe902c1e6beb105b2f24172f238645, and the fix will be included in TensorFlow 2.11.