TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7 - Patch, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/commit/dbdd98c37bc25249e8f288bd30d01e118a7b4498 - Patch, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4 - Release Notes, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2 - Release Notes, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1 - Release Notes, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0 - Release Notes, Third Party Advisory | |
References | () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5wpj-c6f7-24x8 - Exploit, Patch, Third Party Advisory |
Information
Published : 2022-05-20 22:16
Updated : 2024-11-21 06:58
NVD link : CVE-2022-29207
Mitre link : CVE-2022-29207
CVE.ORG link : CVE-2022-29207
JSON object : View
Products Affected
- tensorflow