Skip to main content

Reachable Assertion

CVE-2022-35989

Severity High
Score 7.5/10

Summary

TensorFlow is an open source platform for machine learning. When `MaxPool` receives a window size input array `ksize` with dimensions greater than its input tensor `input`, the GPU kernel gives a `CHECK` fail that can be used to trigger a denial of service attack. Fix for this vulnerability was included in TensorFlow 2.10.0. This vulnerability was also fixed in TensorFlow 2.9.2, TensorFlow 2.8.3, and TensorFlow 2.7.4, as these are also affected and still in supported range. There are no known workarounds for this issue. This issue affects versions prior to 2.7.4, 2.8.x prior to 2.8.3, and 2.9.x prior to 2.9.2.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-617 - Reachable Assertion

The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.

Advisory Timeline

  • Published