CVE-2022-23567: Integer Overflow or Wraparound
(updated )
Tensorflow is an Open Source Machine Learning Framework. The implementations of Sparse*Cwise*
ops are vulnerable to integer overflows. These can be used to trigger large allocations or CHECK
-fails when building new TensorShape
objects . We are missing some validation on the shapes of the input tensors as well as directly constructing a large TensorShape
with user-provided dimensions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References
- github.com/advisories/GHSA-rrx2-r989-2c43
- github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc
- github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md
- github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8
- github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510
- github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43
- nvd.nist.gov/vuln/detail/CVE-2022-23567
Detect and mitigate CVE-2022-23567 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →