Update dependency tensorflow to v2.8.1 [SECURITY] #331
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
==2.8.0
->==2.8.1
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2022-29193
Impact
The implementation of
tf.raw_ops.TensorSummaryV2
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code assumes
axis
is a scalar but there is no validation for this.Patches
We have patched the issue in GitHub commit 290bb05c80c327ed74fae1d089f1001b1e2a4ef7.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University and Hong Jin from Singapore Management University.
CVE-2022-29191
Impact
The implementation of
tf.raw_ops.GetSessionTensor
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code assumes
handle
is a scalar but there is no validation for this:Patches
We have patched the issue in GitHub commit 48305e8ffe5246d67570b64096a96f8e315a7281.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29192
Impact
The implementation of
tf.raw_ops.QuantizeAndDequantizeV4Grad
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code assumes
input_min
andinput_max
are scalars but there is no validation for this.Patches
We have patched the issue in GitHub commit 098e7762d909bac47ce1dbabe6dfd06294cb9d58.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29194
Impact
The implementation of
tf.raw_ops.DeleteSessionTensor
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code assumes
handle
is a scalar but there is no validation for this:Patches
We have patched the issue in GitHub commit cff267650c6a1b266e4b4500f69fbc49cdd773c5.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29195
Impact
The implementation of
tf.raw_ops.StagePeek
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code assumes
index
is a scalar but there is no validation for this before accessing its value:Patches
We have patched the issue in GitHub commit cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29196
Impact
The implementation of
tf.raw_ops.Conv3DBackpropFilterV2
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code does not validate that the
filter_sizes
argument is a vector.Patches
We have patched the issue in GitHub commit 174c5096f303d5be7ed2ca2662b08371bff4ab88.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29197
Impact
The implementation of
tf.raw_ops.UnsortedSegmentJoin
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code assumes
num_segments
is a scalar but there is no validation for this before accessing its value:Patches
We have patched the issue in GitHub commit 13d38a07ce9143e044aa737cfd7bb759d0e9b400.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29198
Impact
The implementation of
tf.raw_ops.SparseTensorToCSRSparseMatrix
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code assumes
dense_shape
is a vector andindices
is a matrix (as part of requirements for sparse tensors) but there is no validation for this:Patches
We have patched the issue in GitHub commit ea50a40e84f6bff15a0912728e35b657548cef11.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29199
Impact
The implementation of
tf.raw_ops.LoadAndRemapMatrix
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code assumes
initializing_values
is a vector but there is no validation for this before accessing its value:Patches
We have patched the issue in GitHub commit 3150642acbbe254e3c3c5d2232143fa591855ac9.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29200
Impact
The implementation of
tf.raw_ops.LSTMBlockCell
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code does not validate the ranks of any of the arguments to this API call. This results in
CHECK
-failures when the elements of the tensor are accessed.Patches
We have patched the issue in GitHub commit 803404044ae7a1efac48ba82d74111fce1ddb09a.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29201
Impact
The implementation of
tf.raw_ops.QuantizedConv2D
does not fully validate the input arguments:In this case, references get bound to
nullptr
for each argument that is empty (in the example, all arguments in thebad args
section).Patches
We have patched the issue in GitHub commit 0f0b080ecde4d3dfec158d6f60da34d5e31693c4.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29202
Impact
The implementation of
tf.ragged.constant
does not fully validate the input arguments. This results in a denial of service by consuming all available memory:Patches
We have patched the issue in GitHub commit bd4d5583ff9c8df26d47a23e508208844297310e.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported externally via a GitHub issue.
CVE-2022-29203
Impact
The implementation of
tf.raw_ops.SpaceToBatchND
(in all backends such as XLA and handwritten kernels) is vulnerable to an integer overflow:The result of this integer overflow is used to allocate the output tensor, hence we get a denial of service via a
CHECK
-failure (assertion failure), as in TFSA-2021-198.Patches
We have patched the issue in GitHub commit acd56b8bcb72b163c834ae4f18469047b001fadf.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29204
Impact
The implementation of
tf.raw_ops.UnsortedSegmentJoin
does not fully validate the input arguments. This results in aCHECK
-failure which can be used to trigger a denial of service attack:The code assumes
num_segments
is a positive scalar but there is no validation:Since this value is used to allocate the output tensor, a negative value would result in a
CHECK
-failure (assertion failure), as per TFSA-2021-198.Patches
We have patched the issue in GitHub commit 84563f265f28b3c36a15335c8b005d405260e943 and GitHub commit 20cb18724b0bf6c09071a3f53434c4eec53cc147.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported externally via a GitHub issue.
CVE-2022-29205
Impact
There is a potential for segfault / denial of service in TensorFlow by calling
tf.compat.v1.*
ops which don't yet have support for quantized types (added after migration to TF 2.x):In these scenarios, since the kernel is missing, a
nullptr
value is passed toParseDimensionValue
for thepy_value
argument. Then, this is dereferenced, resulting in segfault.Patches
We have patched the issue in GitHub commit 237822b59fc504dda2c564787f5d3ad9c4aa62d9.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Hong Jin from Singapore Management University.
CVE-2022-29206
Impact
The implementation of
tf.raw_ops.SparseTensorDenseAdd
does not fully validate the input arguments:In this case, a reference gets bound to a
nullptr
during kernel execution. This is UB.Patches
We have patched the issue in GitHub commit 11ced8467eccad9c7cb94867708be8fa5c66c730.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29207
Impact
Multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid:
In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior.
Patches
We have patched the issue in GitHub commit a5b89cd68c02329d793356bda85d079e9e69b4e7 and GitHub commit dbdd98c37bc25249e8f288bd30d01e118a7b4498.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Hong Jin from Singapore Management University.
CVE-2022-29208
Impact
The implementation of
tf.raw_ops.EditDistance
has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service:In multiple places throughout the code, we are computing an index for a write operation:
However, the existing validation only checks against the upper bound of the array. Hence, it is possible to write before the array by massaging the input to generate negative values for
loc
.Patches
We have patched the issue in GitHub commit 30721cf564cb029d34535446d6a5a6357bebc8e7.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-29209
Impact
The macros that TensorFlow uses for writing assertions (e.g.,
CHECK_LT
,CHECK_GT
, etc.) have an incorrect logic when comparingsize_t
andint
values. Due to type conversion rules, several of the macros would trigger incorrectly.Patches
We have patched the issue in GitHub commit b917181c29b50cb83399ba41f4d938dc369109a1 (merging GitHub PR #55730).
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported externally via a GitHub issue.
CVE-2022-29210
Impact
The
TensorKey
hash function used total estimatedAllocatedBytes()
, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g.int32_t
). It also tried to access individual tensor bytes throughtensor.data()
of sizeAllocatedBytes()
. This led to ASAN failures because theAllocatedBytes()
is an estimate of total bytes allocated by a tensor, including any pointed-to constructs (e.g. strings), and does not refer to contiguous bytes in the.data()
buffer. We couldn't use this byte vector anyways, since types liketstring
include pointers, whereas we need to hash the string values themselves.Patches
We have patched the issue in GitHub commit 1b85a28d395dc91f4d22b5f9e1e9a22e92ccecd6.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, which is the only other affected version.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
CVE-2022-29211
Impact
The implementation of
tf.histogram_fixed_width
is vulnerable to a crash when the values array containNaN
elements:The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index:
If
values
containsNaN
then the result of the division is stillNaN
and the cast toint32
would result in a crash.This only occurs on the CPU implementation.
Patches
We have patched the issue in GitHub commit e57fd691c7b0fd00ea3bfe43444f30c1969748b5.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported externally via a GitHub issue.
CVE-2022-29212
Impact
Certain TFLite models that were created using TFLite model converter would crash when loaded in the TFLite interpreter. The culprit is that during quantization the scale of values could be greater than 1 but code was always assuming sub-unit scaling.
Thus, since code was calling
QuantizeMultiplierSmallerThanOneExp
, theTFLITE_CHECK_LT
assertion would trigger and abort the process.Patches
We have patched the issue in GitHub commit a989426ee1346693cc015792f11d715f6944f2b8.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported externally via a GitHub issue.
CVE-2022-29213
Impact
The
tf.compat.v1.signal.rfft2d
andtf.compat.v1.signal.rfft3d
lack input validation and under certain condition can result in crashes (due toCHECK
-failures).Patches
We have patched the issue in GitHub commit 0a8a781e597b18ead006d19b7d23d0a369e9ad73 (merging GitHub PR #55274).
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported externally via a GitHub issue.
CVE-2022-29216
Impact
TensorFlow's
saved_model_cli
tool is vulnerable to a code injection:This can be used to open a reverse shell
This is because the fix for CVE-2021-41228 was incomplete. Under certain code paths it still allows unsafe execution:
This code path was maintained for compatibility reasons as we had several test cases where numpy expressions were used as arguments.
However, given that the tool is always run manually, the impact of this is still not severe. We have now removed the
safe=False
argument, so all parsing is done withough callingeval
.Patches
We have patched the issue in GitHub commit c5da7af048611aa29e9382371f0aed5018516cac.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Andey Robins from the Cybersecurity Education and Research Lab in the Department of Computer Science at the University of Wyoming.
GHSA-mw6j-hh29-h379
Impact
The implementation of depthwise ops in TensorFlow is vulnerable to a denial of service via
CHECK
-failure (assertion failure) caused by overflowing the number of elements in a tensor:This is another instance of TFSA-2021-198 (CVE-2021-41197).
Patches
We have patched the issue in GitHub commit 3796cc4fcd93ae55812a457abc96dcd55fbb854b.
The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, TensorFlow 2.7.2, and TensorFlow 2.6.4, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou from Secure Systems Lab at Brown University.
CVE-2022-35999
Impact
When
Conv2DBackpropInput
receives emptyout_backprop
inputs (e.g.[3, 1, 0, 1]
), the current CPU/GPU kernelsCHECK
fail (one with dnnl, the other with cudnn). This can be used to trigger a denial of service attack.Patches
We have patched the issue in GitHub commit 27a65a43cf763897fecfa5cdb5cc653fc5dd0346.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Jingyi Shi.
CVE-2022-35997
Impact
If
tf.sparse.cross
receives an inputseparator
that is not a scalar, it gives aCHECK
fail that can be used to trigger a denial of service attack.Patches
We have patched the issue in GitHub commit 83dcb4dbfa094e33db084e97c4d0531a559e0ebf.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Kang Hong Jin.
CVE-2022-35935
Impact
The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming
input(0)
,input(1)
, andinput(2)
to be scalar.Patches
We have patched the issue in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by:
CVE-2022-35934
Impact
The implementation of tf.reshape op in TensorFlow is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by overflowing the number of elements in a tensor:
This is another instance of TFSA-2021-198 (GHSA-prcg-wp5q-rv7p).
Patches
We have patched the issue in GitHub commit 61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Kang Hong Jin from Singapore Management University.
CVE-2022-35937
Impact
The
GatherNd
function takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read is triggered.Patches
We have patched the issue in GitHub commit 595a65a3e224a0362d7e68c2213acfc2b499a196.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Hui Peng from Baidu Security.
CVE-2022-35939
Impact
The
ScatterNd
function takes an input argument that determines the indices of of the output tensor. An input index greater than the output tensor or less than zero will either write content at the wrong index or trigger a crash.Patches
We have patched the issue in GitHub commit b4d4b4cb019bd7240a52daa4ba61e3cc814f0384.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Hui Peng from Baidu Security.
CVE-2022-36027
Impact
When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process.
Patches
We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Lukas Geiger via Github issue.
CVE-2022-36019
Impact
If
FakeQuantWithMinMaxVarsPerChannel
is givenmin
ormax
tensors of a rank other than one, it results in aCHECK
fail that can be used to trigger a denial of service attack.Patches
We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou, Secure Systems Labs, Brown University.
CVE-2022-36018
Impact
If
RaggedTensorToVariant
is given art_nested_splits
list that contains tensors of ranks other than one, it results in aCHECK
fail that can be used to trigger a denial of service attack.Patches
We have patched the issue in GitHub commit 88f93dfe691563baa4ae1e80ccde2d5c7a143821.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou, Secure Systems Labs, Brown University.
CVE-2022-36026
Impact
If
QuantizeAndDequantizeV3
is given a nonscalarnum_bits
input tensor, it results in aCHECK
fail that can be used to trigger a denial of service attack.Patches
We have patched the issue in GitHub commit f3f9cb38ecfe5a8a703f2c4a8fead434ef291713.
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Neophytos Christou, Secure Systems Labs, Brown University.
CVE-2022-35941
Impact
The
AvgPoolOp
function takes an argumentksize
that must be positive but is not