CVE-2022-41891

MEDIUM

Google Tensorflow < 2.8.4 - Improper Input Validation

Title source: rule
STIX 2.1

Description

TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListConcat` is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit fc33f3dc4c14051a83eec6535b608abe1d355fde. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

Scores

CVSS v3 4.8
EPSS 0.0018
EPSS Percentile 38.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-20
Status published
Products (4)
google/tensorflow < 2.8.4
pypi/tensorflow 0 - 2.8.4PyPI
pypi/tensorflow-cpu 0 - 2.8.4PyPI
pypi/tensorflow-gpu 0 - 2.8.4PyPI
Published Nov 18, 2022
Tracked Since Feb 18, 2026