Lucene search

K
githubGitHub Advisory DatabaseGHSA-H246-CGH4-7475
HistoryNov 21, 2022 - 8:42 p.m.

`CHECK` fail in `BCast` overflow

2022-11-2120:42:10
CWE-704
GitHub Advisory Database
github.com
5

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.9%

Impact

If BCast::ToShape is given input larger than an int32, it will crash, despite being supposed to handle up to an int64. An example can be seen in tf.experimental.numpy.outer by passing in large input to the input b.

import tensorflow as tf
value = tf.constant(shape=[2, 1024, 1024, 1024], value=False)
tf.experimental.numpy.outer(a=6,b=value)

Patches

We have patched the issue in GitHub commit 8310bf8dd188ff780e7fc53245058215a05bdbe5.

The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported by Pattarakrit Rattankul.

Affected configurations

Vulners
Node
tensorflowgpuRange<2.10.1
OR
tensorflowcpuRange<2.10.1
OR
tensorflowgpuRange<2.9.3
OR
tensorflowcpuRange<2.9.3
OR
tensorflowgpuRange<2.8.4
OR
tensorflowcpuRange<2.8.4
OR
github_advisory_databasetensorflowRange<2.10.1
OR
github_advisory_databasetensorflowRange<2.9.3
OR
github_advisory_databasetensorflowRange<2.8.4

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

36.9%