Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-36016


TensorFlow is an open source platform for machine learning. When `tensorflow::full_type::SubstituteFromAttrs` receives a `FullTypeDef& t` that is not exactly three args, it triggers a `CHECK`-fail instead of returning a status. We have patched the issue in GitHub commit 6104f0d4091c260ce9352f9155f7e9b725eab012. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.


Published

2022-09-16T23:15:11.307

Last Modified

2024-11-21T07:12:11.417

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.9 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-617

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application google tensorflow < 2.7.2 Yes
Application google tensorflow < 2.8.1 Yes
Application google tensorflow < 2.9.1 Yes
Application google tensorflow 2.10 Yes
Application google tensorflow 2.10 Yes
Application google tensorflow 2.10 Yes
Application google tensorflow 2.10 Yes

References