Add advisory for CVE-2022-23561
PiperOrigin-RevId: 425949157
Change-Id: Ifc0cdfa05908ff3a7e0f616e96e646801fa6abf5
diff --git a/tensorflow/security/advisory/tfsa-2022-025.md b/tensorflow/security/advisory/tfsa-2022-025.md
new file mode 100644
index 0000000..bbc4d59
--- /dev/null
+++ b/tensorflow/security/advisory/tfsa-2022-025.md
@@ -0,0 +1,18 @@
+## TFSA-2022-025: Dangerous OOB write in TFLite
+
+### CVE Number
+CVE-2022-23561
+
+### Impact
+An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions.
+
+### Patches
+We have patched the issue in GitHub commit [6c0b2b70eeee588591680f5b7d5d38175fd7cdf6](https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6).
+
+The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.