First published: Fri Sep 16 2022(Updated: )
TensorFlow is an open source platform for machine learning. The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. This issue has been patched in GitHub commit c65c67f88ad770662e8f191269a907bf2b94b1bf. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | >=2.7.0<2.7.2 | |
Google TensorFlow | >=2.8.0<2.8.1 | |
Google TensorFlow | >=2.9.0<2.9.1 | |
Google TensorFlow | =2.10-rc0 | |
Google TensorFlow | =2.10-rc1 | |
Google TensorFlow | =2.10-rc2 | |
Google TensorFlow | =2.10-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-35935 is categorized as moderate due to the potential for denial of service.
To fix CVE-2022-35935, update TensorFlow to version 2.7.3 or later, 2.8.2 or later, 2.9.2 or later, or 2.10-rc4 or later.
CVE-2022-35935 affects TensorFlow versions 2.7.0 to 2.7.2, 2.8.0 to 2.8.1, and 2.9.0 to 2.9.1, along with specific release candidates of 2.10.
CVE-2022-35935 causes denial of service issues through assertion failures when certain inputs are not scalars.
Yes, the permanent fix for CVE-2022-35935 requires upgrading to the patched versions of TensorFlow.