First published: Fri May 20 2022(Updated: )
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SpaceToBatchND` (in all backends such as XLA and handwritten kernels) is vulnerable to an integer overflow: The result of this integer overflow is used to allocate the output tensor, hence we get a denial of service via a `CHECK`-failure (assertion failure), as in TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.6.4 | |
Google TensorFlow | >=2.7.0<2.7.2 | |
Google TensorFlow | =2.7.0-rc0 | |
Google TensorFlow | =2.7.0-rc1 | |
Google TensorFlow | =2.8.0 | |
Google TensorFlow | =2.8.0-rc0 | |
Google TensorFlow | =2.8.0-rc1 | |
Google TensorFlow | =2.9.0-rc0 | |
Google TensorFlow | =2.9.0-rc1 |
https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29203 is considered to have a high severity due to its integer overflow vulnerability that can lead to potential exploitation.
To fix CVE-2022-29203, update to TensorFlow versions 2.9.0, 2.8.1, 2.7.2, or 2.6.4 or later.
CVE-2022-29203 affects TensorFlow versions prior to 2.9.0, including 2.8.1, 2.7.2, and 2.6.4.
The impact of CVE-2022-29203 includes the potential for arbitrary code execution through the exploitation of an integer overflow in the SpaceToBatchND operation.
Yes, all TensorFlow backends including XLA and handwritten kernels are affected by CVE-2022-29203.