CVE-2022-29205
20.05.2022, 23:15
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.Enginsight
Vendor | Product | Version |
---|---|---|
tensorflow | 𝑥 < 2.6.4 | |
tensorflow | 2.7.0 ≤ 𝑥 < 2.7.2 | |
tensorflow | 2.7.0:rc0 | |
tensorflow | 2.7.0:rc1 | |
tensorflow | 2.8.0 | |
tensorflow | 2.8.0:rc0 | |
tensorflow | 2.8.0:rc1 | |
tensorflow | 2.9.0:rc0 | |
tensorflow | 2.9.0:rc1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References