Google Tensorflow vulnerabilities
432 known vulnerabilities affecting google/tensorflow.
Total CVEs
432
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL18HIGH234MEDIUM178LOW2
Vulnerabilities
Page 7 of 22
CVE-2022-29207MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29207 [MEDIUM] CWE-20 CVE-2022-29207: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerabil
nvd
CVE-2022-29201MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29201 [MEDIUM] CWE-20 CVE-2022-29201: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizedConv2D` does not fully validate the input arguments. In this case, references get bound to `nullptr` for each argument that is empty. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this
nvd
CVE-2022-29195MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29195 [MEDIUM] CWE-20 CVE-2022-29195: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a scalar but there is no validati
nvd
CVE-2022-29194MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+2 more2022-05-20
CVE-2022-29194 [MEDIUM] CWE-20 CVE-2022-29194: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.DeleteSessionTensor` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a p
nvd
CVE-2022-29192MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+2 more2022-05-20
CVE-2022-29192 [MEDIUM] CWE-20 CVE-2022-29192: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 con
nvd
CVE-2022-29200MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29200 [MEDIUM] CWE-20 CVE-2022-29200: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LSTMBlockCell` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate the ranks of any of the argume
nvd
CVE-2022-29204MEDIUMCVSS 5.5≥ 1.15.0, < 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29204 [MEDIUM] CWE-20 CVE-2022-29204: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a positive scala
nvd
CVE-2022-29196MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29196 [MEDIUM] CWE-20 CVE-2022-29196: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.Conv3DBackpropFilterV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate that the `filter_size
nvd
CVE-2022-29205MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29205 [MEDIUM] CWE-476 CVE-2022-29205: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is
nvd
CVE-2022-29203MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29203 [MEDIUM] CWE-190 CVE-2022-29203: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SpaceToBatchND` (in all backends such as XLA and handwritten kernels) is vulnerable to an integer overflow: The result of this integer overflow is used to allocate the output tensor, hence we get a denial of
nvd
CVE-2022-29199MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29199 [MEDIUM] CWE-20 CVE-2022-29199: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LoadAndRemapMatrix does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `initializing_values` is a vector bu
nvd
CVE-2022-29202MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29202 [MEDIUM] CWE-20 CVE-2022-29202: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.ragged.constant` does not fully validate the input arguments. This results in a denial of service by consuming all available memory. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
nvd
CVE-2022-29206MEDIUMCVSS 5.5fixed in 2.6.4≥ 2.7.0, < 2.7.2+3 more2022-05-20
CVE-2022-29206 [MEDIUM] CWE-20 CVE-2022-29206: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, a
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.
nvd
CVE-2022-23587CRITICALCVSS 9.8≤ 2.5.2≥ 2.6.0, ≤ 2.6.2+1 more2022-02-04
CVE-2022-23587 [CRITICAL] CWE-190 CVE-2022-23587: Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow is vulnerable to an integer overflow during cost estimation for crop and resize. Since the cropping parameters are user controlled, a malicious person can trigger undefined behavior. The fix will be included in TensorFlow 2.8.0. We wi
nvd
CVE-2022-23591HIGHCVSS 7.5≤ 2.5.2≥ 2.6.0, ≤ 2.6.2+1 more2022-02-04
CVE-2022-23591 [HIGH] CWE-400 CVE-2022-23591: Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does no
Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in a stack overflow during execution
nvd
CVE-2022-23560HIGHCVSS 8.8≤ 2.5.2≥ 2.6.0, ≤ 2.6.2+1 more2022-02-04
CVE-2022-23560 [HIGH] CWE-125 CVE-2022-23560: Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that w
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would allow limited reads and writes outside of arrays in TFLite. This exploits missing validation in the conversion from sparse tensors to dense tensors. The fix is included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, T
nvd
CVE-2022-23573HIGHCVSS 8.8≤ 2.5.2≥ 2.6.0, ≤ 2.6.2+1 more2022-02-04
CVE-2022-23573 [HIGH] CWE-908 CVE-2022-23573: Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result in copying uninitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but does not check that the right hand
nvd
CVE-2022-23590HIGHCVSS 7.5fixed in 2.7.12022-02-04
CVE-2022-23590 [HIGH] CWE-754 CVE-2022-23590: Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `SavedModel`
Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering a `StatusOr` value that is an error and forcibly extracting the value from it. We have patched the issue in multiple GitHub commits and these will be included in Tens
nvd
CVE-2022-23574HIGHCVSS 8.8≤ 2.5.2≥ 2.6.0, ≤ 2.6.2+1 more2022-02-04
CVE-2022-23574 [HIGH] CWE-125 CVE-2022-23574: Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's `Specialize
Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's `SpecializeType` which results in heap OOB read/write. Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of arguments. Since this is a mutable pr
nvd
CVE-2022-23566HIGHCVSS 8.8≤ 2.5.2≥ 2.6.0, ≤ 2.6.2+1 more2022-02-04
CVE-2022-23566 [HIGH] CWE-787 CVE-2022-23566: Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB writ
Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow
nvd