TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
References
Link | Resource |
---|---|
https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/eager/pywrap_tfe_src.cc#L296-L320 | Third Party Advisory |
https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/eager/pywrap_tfe_src.cc#L480-L482 | Third Party Advisory |
https://github.com/tensorflow/tensorflow/commit/237822b59fc504dda2c564787f5d3ad9c4aa62d9 | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4 | Release Notes Third Party Advisory |
https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2 | Release Notes Third Party Advisory |
https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1 | Release Notes Third Party Advisory |
https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0 | Release Notes Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-54ch-gjq5-4976 | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-05-20T22:25:14
Updated: 2022-05-20T22:25:14
Reserved: 2022-04-13T00:00:00
Link: CVE-2022-29205
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-20T23:15:44.687
Modified: 2022-06-02T19:31:16.883
Link: CVE-2022-29205
JSON object: View
Redhat Information
No data.