GMS-2022-56: Integer Overflow or Wraparound in TensorFlow
Impact
The Grappler component of TensorFlow is vulnerable to a denial of service via CHECK
-failure in constant folding for ;
// …
}
The `output_prop` tensor has a shape that is controlled by user input and this can result in triggering one of the `CHECK`s in the `PartialTensorShape` constructor. This is an instance of TFSA-2021-198 .
### Patches
We have patched the issue in GitHub commit be7b286d40bc68cb0b56f702186cc4837d508058 fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide] for more information regarding the security model and how to contact us with issues and questions.
References
Detect and mitigate GMS-2022-56 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →