Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-29205


TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.


Published

2022-05-20T23:15:44.687

Last Modified

2024-11-21T06:58:42.727

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.5 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-476
    CWE-908

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application google tensorflow < 2.6.4 Yes
Application google tensorflow < 2.7.2 Yes
Application google tensorflow 2.7.0 Yes
Application google tensorflow 2.7.0 Yes
Application google tensorflow 2.8.0 Yes
Application google tensorflow 2.8.0 Yes
Application google tensorflow 2.8.0 Yes
Application google tensorflow 2.9.0 Yes
Application google tensorflow 2.9.0 Yes

References