CVE-2022-41893: Reachable Assertion
TensorFlow is an open source platform for machine learning. If tf.raw_ops.TensorListResize
is given a nonscalar value for input size
, it results CHECK
fail which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 888e34b49009a4e734c27ab0c43b0b5102682c56. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
References
- github.com/advisories/GHSA-67pf-62xr-q35m
- github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/list_kernels.cc
- github.com/tensorflow/tensorflow/commit/888e34b49009a4e734c27ab0c43b0b5102682c56
- github.com/tensorflow/tensorflow/security/advisories/GHSA-67pf-62xr-q35m
- nvd.nist.gov/vuln/detail/CVE-2022-41893
Detect and mitigate CVE-2022-41893 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →