Skip to content

Invalid char to bool conversion when printing a tensor

Moderate severity GitHub Reviewed Published Nov 18, 2022 in tensorflow/tensorflow • Updated Feb 1, 2023

Package

pip tensorflow (pip)

Affected versions

< 2.8.4
>= 2.9.0, < 2.9.3
>= 2.10.0, < 2.10.1

Patched versions

2.8.4
2.9.3
2.10.1
pip tensorflow-cpu (pip)
>= 2.9.0, < 2.9.3
< 2.8.4
>= 2.10.0, < 2.10.1
2.9.3
2.8.4
2.10.1
pip tensorflow-gpu (pip)
>= 2.10.0, < 2.10.1
< 2.8.4
>= 2.9.0, < 2.9.3
2.10.1
2.8.4
2.9.3

Description

Impact

When printing a tensor, we get it's data as a const char* array (since that's the underlying storage) and then we typecast it to the element type. However, conversions from char to bool are undefined if the char is not 0 or 1, so sanitizers/fuzzers will crash.

Patches

We have patched the issue in GitHub commit 1be743703279782a357adbf9b77dcb994fe8b508.

The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.10.1, TensorFlow 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability was discovered via internal fuzzing.

References

@pak-laura pak-laura published to tensorflow/tensorflow Nov 18, 2022
Published by the National Vulnerability Database Nov 18, 2022
Published to the GitHub Advisory Database Nov 21, 2022
Reviewed Nov 21, 2022
Last updated Feb 1, 2023

Severity

Moderate
4.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2022-41911

GHSA ID

GHSA-pf36-r9c6-h97j

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.