First published: Fri Sep 16 2022(Updated: )
TensorFlow is an open source platform for machine learning. When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.7.2 | |
Google TensorFlow | >=2.8.0<2.8.1 | |
Google TensorFlow | >=2.9.0<2.9.1 | |
Google TensorFlow | =2.10-rc0 | |
Google TensorFlow | =2.10-rc1 | |
Google TensorFlow | =2.10-rc2 | |
Google TensorFlow | =2.10-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36027 is a vulnerability in TensorFlow that occurs when converting transposed convolutions using per-channel weight quantization, causing the converter to segfault and crash the Python process.
CVE-2022-36027 has a severity rating of 7.5 (high).
CVE-2022-36027 affects TensorFlow versions up to and including 2.7.2, 2.8.0 to 2.8.1, and 2.9.0 to 2.9.1.
Yes, a fix for CVE-2022-36027 has been patched in the GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450.
More information about CVE-2022-36027 can be found in the TensorFlow GitHub commit (aa0b852a4588cea4d36b74feb05d93055540b450) and the TensorFlow security advisory.