Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Invalid char to bool conversion when printing a tensor in Tensorflow
Vulnerability Description
TensorFlow is an open source platform for machine learning. When printing a tensor, we get it's data as a `const char*` array (since that's the underlying storage) and then we typecast it to the element type. However, conversions from `char` to `bool` are undefined if the `char` is not `0` or `1`, so sanitizers/fuzzers will crash. The issue has been patched in GitHub commit `1be74370327`. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.10.1, TensorFlow 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
Vulnerability Type
不正确的类型转换
Vulnerability Title
Google TensorFlow 代码问题漏洞
Vulnerability Description
Google TensorFlow是美国谷歌(Google)公司的一套用于机器学习的端到端开源平台。 Google TensorFlow 2.11 版本,2.10.1 版本之前的 2.10.x 版本,2.9.3 版本之前的 2.9.x 版本,2.8.4 版本之前的 2.8.x 版本存在代码问题漏洞,该漏洞源于数据组织形式存在逻辑漏洞,如果 const char* 数组不是 0 或 1,则从 char 到 bool 的转换是未定义的,因此 sanitizers/fuzzers 将崩溃。
CVSS Information
N/A
Vulnerability Type
N/A