First published: Fri Sep 16 2022(Updated: )
TensorFlow is an open source platform for machine learning. If `QuantizedAdd` is given `min_input` or `max_input` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 49b3824d83af706df0ad07e4e677d88659756d89. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
TensorFlow Keras | >=2.7.0<2.7.2 | |
TensorFlow Keras | >=2.8.0<2.8.1 | |
TensorFlow Keras | >=2.9.0<2.9.1 | |
TensorFlow Keras | =2.10-rc0 | |
TensorFlow Keras | =2.10-rc1 | |
TensorFlow Keras | =2.10-rc2 | |
TensorFlow Keras | =2.10-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35967 has been identified as a vulnerability that can lead to denial of service due to a segmentation fault.
To fix CVE-2022-35967, upgrade TensorFlow to a version that includes the patch for this vulnerability.
CVE-2022-35967 affects TensorFlow versions from 2.7.0 to 2.9.1, and also includes the 2.10 release candidates.
Exploiting CVE-2022-35967 can result in a segmentation fault, effectively causing a denial of service.
Yes, if unpatched, CVE-2022-35967 could be exploited in production systems that utilize affected versions of TensorFlow.