CVE-2022-21733: Integer Overflow or Wraparound
(updated )
Tensorflow is an Open Source Machine Learning Framework. The implementation of StringNGrams
can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on pad_witdh
and that result in computing a negative value for ngram_width
which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References
- github.com/advisories/GHSA-98j8-c9q4-r38g
- github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc
- github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8
- github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g
- nvd.nist.gov/vuln/detail/CVE-2022-21733
Detect and mitigate CVE-2022-21733 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →