CVE Vulnerabilities

CVE-2022-35965

NULL Pointer Dereference

Published: Sep 16, 2022 | Modified: Sep 20, 2022
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

TensorFlow is an open source platform for machine learning. If LowerBound or UpperBound is given an emptysorted_inputs input, it results in a nullptr dereference, leading to a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit bce3717eaef4f769019fd18e990464ca4a2efeea. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Tensorflow Google 2.7.0 (including) 2.7.2 (excluding)
Tensorflow Google 2.8.0 (including) 2.8.1 (excluding)
Tensorflow Google 2.9.0 (including) 2.9.1 (excluding)
Tensorflow Google 2.10-rc0 (including) 2.10-rc0 (including)
Tensorflow Google 2.10-rc1 (including) 2.10-rc1 (including)
Tensorflow Google 2.10-rc2 (including) 2.10-rc2 (including)
Tensorflow Google 2.10-rc3 (including) 2.10-rc3 (including)

Potential Mitigations

References