CVE-2022-21737
MEDIUMGoogle Tensorflow < 2.5.2 - Improper Condition Check
Title source: ruleDescription
Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount` operations allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail. There are several conditions that the input arguments must satisfy. Some are not caught during shape inference and others are not caught during kernel implementation. This results in `CHECK` failures later when the output tensors get allocated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References (3)
Core 3
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7
Patch, Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9
Exploit, Third Party Advisory x_refsource_misc
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc
Scores
CVSS v3
6.5
EPSS
0.0022
EPSS Percentile
44.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-754
Status
published
Products (5)
google/tensorflow
2.7.0
google/tensorflow
< 2.5.2
pypi/tensorflow
0 - 2.5.3PyPI
pypi/tensorflow-cpu
0 - 2.5.3PyPI
pypi/tensorflow-gpu
0 - 2.5.3PyPI
Published
Feb 03, 2022
Tracked Since
Feb 18, 2026