CVE-2022-21732

Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoolHandle` can be used to trigger a denial of service attack by allocating too much memory. This is because the `num_threads` argument is only checked to not be negative, but there is no upper bound on its value. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:45

Type Values Removed Values Added
CVSS v2 : 4.0
v3 : 6.5
v2 : 4.0
v3 : 4.3
References () https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135 - Exploit, Third Party Advisory () https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135 - Exploit, Third Party Advisory
References () https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e - Patch, Third Party Advisory () https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e - Patch, Third Party Advisory
References () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq - Patch, Third Party Advisory () https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq - Patch, Third Party Advisory

09 Feb 2022, 03:08

Type Values Removed Values Added
References (MISC) https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135 - (MISC) https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135 - Exploit, Third Party Advisory
References (MISC) https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e - (MISC) https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e - Patch, Third Party Advisory
References (CONFIRM) https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq - (CONFIRM) https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq - Patch, Third Party Advisory
CPE cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 6.5
CWE CWE-770

03 Feb 2022, 13:16

Type Values Removed Values Added
CWE CWE-400

03 Feb 2022, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-03 12:15

Updated : 2024-11-21 06:45


NVD link : CVE-2022-21732

Mitre link : CVE-2022-21732

CVE.ORG link : CVE-2022-21732


JSON object : View

Products Affected

google

  • tensorflow
CWE
CWE-770

Allocation of Resources Without Limits or Throttling