CVE-2022-35993

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/09/2022
Last modified:
20/09/2022

Description

TensorFlow is an open source platform for machine learning. When `SetSize` receives an input `set_shape` that is not a 1D tensor, it gives a `CHECK` fails that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit cf70b79d2662c0d3c6af74583641e345fc939467. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.7.2 (excluding)
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.8.0 (including) 2.8.1 (excluding)
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* 2.9.0 (including) 2.9.1 (excluding)
cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*