CVE-2022-23567: Integer Overflow or Wraparound
(updated )
Tensorflow is an Open Source Machine Learning Framework. The implementations of Sparse*Cwise*
ops is vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or CHECK
-fails when building new TensorShape
objects (so, assert failures based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large TensorShape
with user-provided dimensions. The fix will be included in TensorFlow We will also cherrypick this commit on TensorFlow, TensorFlow, and TensorFlow, as these are also affected and still in supported range.
References
- github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc
- github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md
- github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8
- github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510
- github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43
- nvd.nist.gov/vuln/detail/CVE-2022-23567
Detect and mitigate CVE-2022-23567 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →