Memory exhaustion in Tensorflow
Moderate severity
GitHub Reviewed
Published
Feb 2, 2022
in
tensorflow/tensorflow
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Feb 3, 2022
Reviewed
Feb 3, 2022
Published to the GitHub Advisory Database
Feb 10, 2022
Last updated
Feb 3, 2023
Impact
The implementation of
StringNGrams
can be used to trigger a denial of service attack by causing an OOM condition after an integer overflow:We are missing a validation on
pad_witdh
and that result in computing a negative value forngram_width
which is later used to allocate parts of the output.Patches
We have patched the issue in GitHub commit f68fdab93fb7f4ddb4eb438c8fe052753c9413e8.
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
For more information
Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.
Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
References