Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
References
Link | Resource |
---|---|
https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550 | Exploit Third Party Advisory |
https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d | Patch Third Party Advisory |
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Feb 2022, 05:00
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d - Patch, Third Party Advisory | |
References | (MISC) https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550 - Exploit, Third Party Advisory | |
References | (CONFIRM) https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:* cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.5 |
CWE | CWE-843 |
03 Feb 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-03 13:15
Updated : 2024-02-04 22:08
NVD link : CVE-2022-21734
Mitre link : CVE-2022-21734
CVE.ORG link : CVE-2022-21734
JSON object : View
Products Affected
- tensorflow
CWE
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')