Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References
Link | Resource |
---|---|
https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091 | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L24-L33 | Exploit Third Party Advisory |
https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60 | Exploit Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-02-04 15:15
Updated : 2022-02-09 10:50
NVD link : CVE-2022-23558
Mitre link : CVE-2022-23558
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
- tensorflow