First published: Fri May 20 2022(Updated: )
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may compute an index for a write operation. However, the existing validation only checks against the upper bound of the array. Hence, it is possible to write before the array by massaging the input to generate negative values for `loc`. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.6.4 | |
Google TensorFlow | >=2.7.0<2.7.2 | |
Google TensorFlow | =2.7.0-rc0 | |
Google TensorFlow | =2.7.0-rc1 | |
Google TensorFlow | =2.8.0 | |
Google TensorFlow | =2.8.0-rc0 | |
Google TensorFlow | =2.8.0-rc1 | |
Google TensorFlow | =2.9.0-rc0 | |
Google TensorFlow | =2.9.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29208 has been classified as a denial of service vulnerability due to its potential to cause a segmentation fault.
To fix CVE-2022-29208, users should upgrade TensorFlow to versions 2.9.0, 2.8.1, 2.7.2, or 2.6.4 or later.
CVE-2022-29208 affects TensorFlow versions prior to 2.9.0, 2.8.1, 2.7.2, and 2.6.4.
CVE-2022-29208 allows users to pass negative values to the `tf.raw_ops.EditDistance` function, which can lead to a denial of service.
Currently, the best mitigation against CVE-2022-29208 is to upgrade to the patched versions of TensorFlow as no alternative mitigation is specified.