
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-29195 is a denial of service vulnerability in TensorFlow's StagePeek operation that affects versions prior to 2.9.0. The vulnerability was discovered by Neophytos Christou from Secure Systems Lab at Brown University and was disclosed in May 2022. The issue affects TensorFlow versions below 2.9.0, including all versions up to 2.6.4, 2.7.2, and 2.8.1 (TF Release, Security Advisory).
The vulnerability stems from incomplete input validation in the tf.raw_ops.StagePeek operation. Specifically, the code assumes the index parameter is a scalar but fails to validate this assumption before accessing its value through the scalar() method. The vulnerability can be triggered by passing a non-scalar tensor as the index parameter, which leads to a CHECK-failure (Security Advisory).
When exploited, this vulnerability can result in a denial of service condition through a CHECK-failure in the TensorFlow service. This can cause the application to crash when processing specially crafted input (Security Advisory).
The vulnerability has been patched in TensorFlow versions 2.6.4, 2.7.2, 2.8.1, and 2.9.0. Users are advised to upgrade to these patched versions. The fix implements proper validation of the index parameter before accessing it as a scalar value. The patch was implemented in GitHub commit cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb (Security Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."