
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-29199 affects TensorFlow, an open source platform for machine learning, prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4. The vulnerability exists in the implementation of tf.raw_ops.LoadAndRemapMatrix which does not fully validate input arguments. The issue was discovered and disclosed in May 2022 (GitHub Advisory).
The vulnerability stems from insufficient validation of input arguments in the LoadAndRemapMatrix operation. Specifically, the code assumes initializing_values is a vector but performs no validation before accessing its value. This implementation flaw can lead to a CHECK-failure when invalid input is provided (GitHub Advisory).
When exploited, this vulnerability can be used to trigger a denial of service attack through CHECK-failure. The impact is considered Low severity according to the security assessment (GitHub Advisory).
The vulnerability has been patched in TensorFlow versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4. Users should upgrade to one of these patched versions. The fix was implemented in GitHub commit 3150642acbbe254e3c3c5d2232143fa591855ac9 (GitHub Advisory, TF Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."