
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-29193 affects TensorFlow, an open source platform for machine learning. The vulnerability was discovered in the implementation of tf.raw_ops.TensorSummaryV2 where input arguments are not fully validated. This issue affects versions prior to 2.9.0, 2.8.1, 2.7.2, and 2.6.4. The vulnerability was disclosed on May 17, 2022 (GitHub Advisory).
The vulnerability stems from insufficient validation of input arguments in the tf.raw_ops.TensorSummaryV2 function. Specifically, the code assumes that the serialized_summary_metadata parameter is a scalar but fails to validate this assumption. This oversight can lead to a CHECK-failure when non-scalar input is provided. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) (NVD).
When exploited, this vulnerability can be used to trigger a denial of service attack. The CHECK-failure resulting from invalid input arguments can cause the application to crash, disrupting service availability (GitHub Advisory).
The vulnerability has been patched in TensorFlow versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4. The fix involves adding proper validation for the input arguments. Users are advised to upgrade to these patched versions. The fix was implemented in GitHub commit 290bb05c80c327ed74fae1d089f1001b1e2a4ef7 (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."