CVE-2022-29213Improper Input Validation in Tensorflow

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 75.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 21
Latest updateMay 24

Description

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures). Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/tensorflow2.7.02.7.2+4
CVEListV5tensorflow/tensorflow< 2.6.4+3
PyPIintel/optimization_for_tensorflow2.7.02.7.2+2

Patches

🔴Vulnerability Details

3
OSV
Incomplete validation in signal ops leads to crashes in TensorFlow2022-05-24
GHSA
Incomplete validation in signal ops leads to crashes in TensorFlow2022-05-24
CVEList
Incomplete validation in signal ops leads to crashes in TensorFlow2022-05-20

📋Vendor Advisories

1
Debian
CVE-2022-29213: tensorflow - TensorFlow is an open source platform for machine learning. Prior to versions 2....2022
CVE-2022-29213 — Improper Input Validation | cvebase