CVE-2022-41911: Incorrect Type Conversion or Cast
(updated )
TensorFlow is an open source platform for machine learning. When printing a tensor, we get it’s data as a const char*
array (since that’s the underlying storage) and then we typecast it to the element type. However, conversions from char
to bool
are undefined if the char
is not 0
or 1
, so sanitizers/fuzzers will crash. The issue has been patched in GitHub commit 1be74370327
. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.10.1, TensorFlow 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
References
- github.com/advisories/GHSA-pf36-r9c6-h97j
- github.com/tensorflow/tensorflow/blob/807cae8a807960fd7ac2313cde73a11fc15e7942/tensorflow/core/framework/tensor.cc
- github.com/tensorflow/tensorflow/commit/1be743703279782a357adbf9b77dcb994fe8b508
- github.com/tensorflow/tensorflow/security/advisories/GHSA-pf36-r9c6-h97j
- nvd.nist.gov/vuln/detail/CVE-2022-41911
Detect and mitigate CVE-2022-41911 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →