CVE-2022-29197
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
Published
2022-05-20T22:16:40.747
Last Modified
2024-11-21T06:58:41.507
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 5.5 (MEDIUM)
CVSSv2 Vector
AV:L/AC:L/Au:N/C:N/I:N/A:P
- Access Vector: LOCAL
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
3.9
Impact Score
2.9
Weaknesses
-
Type: Secondary
CWE-20
-
Type: Primary
CWE-20
Affected Vendors & Products
References
-
https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/unsorted_segment_join_op.cc#L92-L95
Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400
Patch, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4
Release Notes, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2
Release Notes, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1
Release Notes, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0
Release Notes, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hrg5-737c-2p56
Exploit, Patch, Third Party Advisory
([email protected])
-
https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/unsorted_segment_join_op.cc#L92-L95
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4
Release Notes, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2
Release Notes, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1
Release Notes, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0
Release Notes, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hrg5-737c-2p56
Exploit, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)