Vulnerability Description
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a positive scalar but there is no validation. Since this value is used to allocate the output tensor, a negative value would result in a `CHECK`-failure (assertion failure), as per TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tensorflow | >= 1.15.0, < 2.6.4 |
Related Weaknesses (CWE)
References
- https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce8Third Party Advisory
- https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisorPatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/commit/20cb18724b0bf6c09071a3f53434c4eePatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/commit/84563f265f28b3c36a15335c8b005d40PatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4Release NotesThird Party Advisory
- https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2Release NotesThird Party Advisory
- https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1Release NotesThird Party Advisory
- https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0Release NotesThird Party Advisory
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx9q-2mx4-m4pgExploitPatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce8Third Party Advisory
- https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisorPatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/commit/20cb18724b0bf6c09071a3f53434c4eePatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/commit/84563f265f28b3c36a15335c8b005d40PatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4Release NotesThird Party Advisory
- https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2Release NotesThird Party Advisory
FAQ
What is CVE-2022-29204?
CVE-2022-29204 is a vulnerability with a CVSS score of 5.5 (MEDIUM). TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input a...
How severe is CVE-2022-29204?
CVE-2022-29204 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-29204?
Check the references section above for vendor advisories and patch information. Affected products include: Google Tensorflow.