CVE-2022-29205
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
20/05/2022
Last modified:
02/06/2022
Description
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* | 2.6.4 (excluding) | |
| cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* | 2.7.0 (including) | 2.7.2 (excluding) |
| cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:* | ||
| cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:google:tensorflow:2.8.0:-:*:*:*:*:*:* | ||
| cpe:2.3:a:google:tensorflow:2.8.0:rc0:*:*:*:*:*:* | ||
| cpe:2.3:a:google:tensorflow:2.8.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:google:tensorflow:2.9.0:rc0:*:*:*:*:*:* | ||
| cpe:2.3:a:google:tensorflow:2.9.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/eager/pywrap_tfe_src.cc#L296-L320
- https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/eager/pywrap_tfe_src.cc#L480-L482
- https://github.com/tensorflow/tensorflow/commit/237822b59fc504dda2c564787f5d3ad9c4aa62d9
- https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4
- https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2
- https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1
- https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-54ch-gjq5-4976



