CVE-2022-41889
MEDIUMGoogle Tensorflow < 2.8.4 - NULL Pointer Dereference
Title source: ruleDescription
TensorFlow is an open source platform for machine learning. If a list of quantized tensors is assigned to an attribute, the pywrap code fails to parse the tensor and returns a `nullptr`, which is not caught. An example can be seen in `tf.compat.v1.extract_volume_patches` by passing in quantized tensors as input `ksizes`. We have patched the issue in GitHub commit e9e95553e5411834d215e6770c81a83a3d0866ce. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
References (3)
Core 3
Core References
Exploit, Patch, Third Party Advisory x_refsource_confirm
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xxcj-rhqg-m46g
Patch, Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/commit/e9e95553e5411834d215e6770c81a83a3d0866ce
Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/generate_box_proposals_op.cu.cc
Scores
CVSS v3
5.5
EPSS
0.0012
EPSS Percentile
30.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-476
Status
published
Products (4)
google/tensorflow
< 2.8.4
pypi/tensorflow
0 - 2.8.4PyPI
pypi/tensorflow-cpu
0 - 2.8.4PyPI
pypi/tensorflow-gpu
0 - 2.8.4PyPI
Published
Nov 18, 2022
Tracked Since
Feb 18, 2026