CVE-2022-29207

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.8.0:-:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.8.0:rc0:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.9.0:rc0:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.9.0:rc1:*:*:*:*:*:*

History

21 Nov 2024, 06:58

Type Values Removed Values Added
References () https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7 - Patch, Third Party Advisory () https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7 - Patch, Third Party Advisory
References () https://github.com/tensorflow/tensorflow/commit/dbdd98c37bc25249e8f288bd30d01e118a7b4498 - Patch, Third Party Advisory () https://github.com/tensorflow/tensorflow/commit/dbdd98c37bc25249e8f288bd30d01e118a7b4498 - Patch, Third Party Advisory
References () https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4 - Release Notes, Third Party Advisory () https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4 - Release Notes, Third Party Advisory
References () https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2 - Release Notes, Third Party Advisory () https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2 - Release Notes, Third Party Advisory
References () https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1 - Release Notes, Third Party Advisory () https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1 - Release Notes, Third Party Advisory
References () https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0 - Release Notes, Third Party Advisory () https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0 - Release Notes, Third Party Advisory
References () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5wpj-c6f7-24x8 - Exploit, Patch, Third Party Advisory () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5wpj-c6f7-24x8 - Exploit, Patch, Third Party Advisory

Information

Published : 2022-05-20 22:16

Updated : 2024-11-21 06:58


NVD link : CVE-2022-29207

Mitre link : CVE-2022-29207

CVE.ORG link : CVE-2022-29207


JSON object : View

Products Affected

google

  • tensorflow
CWE
CWE-20

Improper Input Validation

CWE-475

Undefined Behavior for Input to API