CVE-2022-21737

MEDIUM

Google Tensorflow < 2.5.2 - Improper Condition Check

Title source: rule
STIX 2.1

Description

Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount` operations allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail. There are several conditions that the input arguments must satisfy. Some are not caught during shape inference and others are not caught during kernel implementation. This results in `CHECK` failures later when the output tensors get allocated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.

Scores

CVSS v3 6.5
EPSS 0.0022
EPSS Percentile 44.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-754
Status published
Products (5)
google/tensorflow 2.7.0
google/tensorflow < 2.5.2
pypi/tensorflow 0 - 2.5.3PyPI
pypi/tensorflow-cpu 0 - 2.5.3PyPI
pypi/tensorflow-gpu 0 - 2.5.3PyPI
Published Feb 03, 2022
Tracked Since Feb 18, 2026