Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `Dequantize` is vulnerable to an integer overflow weakness. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked, and, since the code computes `axis + 1`, an attacker can trigger an integer overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References
Link | Resource |
---|---|
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034 | Exploit Third Party Advisory |
https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-02-03T11:07:40
Updated: 2022-02-03T11:07:40
Reserved: 2021-11-16T00:00:00
Link: CVE-2022-21727
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-03T11:15:07.953
Modified: 2022-02-08T20:14:44.770
Link: CVE-2022-21727
JSON object: View
Redhat Information
No data.
CWE