Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place). First, during constant folding, the `GraphDef` might not have the required nodes for the binary operation. If a node is missing, the correposning `mul_*child` would be null, and the dereference in the subsequent line would be incorrect. We have a similar issue during `IsIdentityConsumingSwitch`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74 - Exploit, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497 - Exploit, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf - Patch, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1 - Patch, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp - Patch, Third Party Advisory |
Information
Published : 2022-02-04 23:15
Updated : 2024-11-21 06:48
NVD link : CVE-2022-23589
Mitre link : CVE-2022-23589
CVE.ORG link : CVE-2022-23589
JSON object : View
Products Affected
- tensorflow
CWE
CWE-476
NULL Pointer Dereference