First published: Fri Sep 16 2022(Updated: )
TensorFlow is an open source platform for machine learning. `ParameterizedTruncatedNormal` assumes `shape` is of type `int32`. A valid `shape` of type `int64` results in a mismatched type `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 72180be03447a10810edca700cbc9af690dfeb51. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.7.2 | |
Google TensorFlow | >=2.8.0<2.8.1 | |
Google TensorFlow | >=2.9.0<2.9.1 | |
Google TensorFlow | =2.10-rc0 | |
Google TensorFlow | =2.10-rc1 | |
Google TensorFlow | =2.10-rc2 | |
Google TensorFlow | =2.10-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35984 has been identified as a denial of service vulnerability due to a mismatched type CHECK fail.
To remediate CVE-2022-35984, update TensorFlow to version 2.10-rc4 or later.
CVE-2022-35984 affects multiple versions of TensorFlow, specifically versions prior to 2.10-rc4.
CVE-2022-35984 can be exploited by providing a valid shape of type int64 which causes a denial of service.
Yes, a patch for CVE-2022-35984 has been provided in TensorFlow version 2.10-rc4.