CVE-2022-21731
Type confusion leading to segfault in Tensorflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `min_rank` is computed based on `concat_dim`. This is then used to validate that the `values` tensor has at least the required rank. However, `WithRankAtLeast` receives the lower bound as a 64-bits value and then compares it against the maximum 32-bits integer value that could be represented. Due to the fact that `min_rank` is a 32-bits value and the value of `axis`, the `rank` argument is a negative value, so the error check is bypassed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Tensorflow es un marco de aprendizaje automático de código abierto. La implementación de la inferencia de formas para "ConcatV2" puede ser usada para desencadenar un ataque de denegación de servicio por medio de un segfault causado por una confusión de tipos. El argumento "axis" es traducido en "concat_dim" en la función de ayuda "ConcatShapeHelper". A continuación, es calculado un valor para "min_rank" basado en "concat_dim". Este valor es usado para comprender que el tensor "values" presenta al menos el rango requerido. Sin embargo, "WithRankAtLeast" recibe el límite inferior como un valor de 64 bits y luego lo compara con el valor entero máximo de 32 bits que podría representarse. Debido a que "min_rank" es un valor de 32 bits y el valor de "axis", el argumento "rank" es un valor negativo, por lo que la comprobación del error es omitida. La corrección será incluida en TensorFlow versión 2.8.0. También seleccionaremos este commit en TensorFlow versión 2.7.1, TensorFlow versión 2.6.3, y TensorFlow versión 2.5.3, ya que estos también están afectados y aún están en el rango admitido
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-11-16 CVE Reserved
- 2022-02-03 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-10-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | Tensorflow Search vendor "Google" for product "Tensorflow" | <= 2.5.2 Search vendor "Google" for product "Tensorflow" and version " <= 2.5.2" | - |
Affected
| ||||||
Google Search vendor "Google" | Tensorflow Search vendor "Google" for product "Tensorflow" | >= 2.6.0 <= 2.6.2 Search vendor "Google" for product "Tensorflow" and version " >= 2.6.0 <= 2.6.2" | - |
Affected
| ||||||
Google Search vendor "Google" | Tensorflow Search vendor "Google" for product "Tensorflow" | 2.7.0 Search vendor "Google" for product "Tensorflow" and version "2.7.0" | - |
Affected
|