Description
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References (3)
Core 3
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g
Patch, Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8
Exploit, Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161
Scores
CVSS v3
4.3
EPSS
0.0023
EPSS Percentile
45.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-190
Status
published
Products (5)
google/tensorflow
2.7.0
google/tensorflow
< 2.5.2
pypi/tensorflow
0 - 2.5.3PyPI
pypi/tensorflow-cpu
0 - 2.5.3PyPI
pypi/tensorflow-gpu
0 - 2.5.3PyPI
Published
Feb 03, 2022
Tracked Since
Feb 18, 2026