
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-29198 is a security vulnerability in TensorFlow, an open source platform for machine learning. The vulnerability was discovered in versions prior to 2.9.0, 2.8.1, 2.7.2, and 2.6.4, where the implementation of tf.raw_ops.SparseTensorToCSRSparseMatrix did not properly validate input arguments. The issue was disclosed on May 17, 2022 (TF Advisory).
The vulnerability stems from insufficient validation of input arguments in the SparseTensorToCSRSparseMatrix operation. The code assumes dense_shape is a vector and indices is a matrix (as part of requirements for sparse tensors) but fails to validate these assumptions. This oversight can lead to a CHECK-failure when invalid inputs are provided (TF Advisory). The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can be exploited to trigger a denial of service attack. When malicious inputs are provided, the application can crash due to the CHECK-failure, making the service unavailable (TF Advisory).
The vulnerability has been patched in TensorFlow versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4. Users should upgrade to these or newer versions. The fix was implemented in GitHub commit ea50a40e84f6bff15a0912728e35b657548cef11, which adds proper input validation (TF Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."