CVE-2022-29205NULL Pointer Dereference in Tensorflow

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 85.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 20
Latest updateMay 24

Description

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Version

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/tensorflow2.7.02.7.2+4
CVEListV5tensorflow/tensorflow< 2.6.4+3
PyPIintel/optimization_for_tensorflow2.7.02.7.2+2

Patches

🔴Vulnerability Details

3
OSV
Segfault due to missing support for quantized types2022-05-24
GHSA
Segfault due to missing support for quantized types2022-05-24
CVEList
Segfault due to missing support for quantized types in TensorFlow2022-05-20

📋Vendor Advisories

1
Debian
CVE-2022-29205: tensorflow - TensorFlow is an open source platform for machine learning. Prior to versions 2....2022
CVE-2022-29205 — NULL Pointer Dereference in Tensorflow | cvebase