Severity
5.5MEDIUMNVD
EPSS
0.1%
top 84.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 20
Latest updateMay 24

Description

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.ragged.constant` does not fully validate the input arguments. This results in a denial of service by consuming all available memory. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/tensorflow2.7.02.7.2+4
CVEListV5tensorflow/tensorflow< 2.6.4+3
PyPIintel/optimization_for_tensorflow2.7.02.7.2+2

Patches

🔴Vulnerability Details

3
GHSA
Denial of service in `tf.ragged.constant` due to lack of validation2022-05-24
OSV
Denial of service in `tf.ragged.constant` due to lack of validation2022-05-24
CVEList
Denial of service in TensorFlow due to lack of validation in `tf.ragged.constant`2022-05-20

📋Vendor Advisories

1
Debian
CVE-2022-29202: tensorflow - TensorFlow is an open source platform for machine learning. Prior to versions 2....2022
CVE-2022-29202 — Improper Input Validation | cvebase