Skip to main content

Reachable Assertion

CVE-2022-36026

Severity High
Score 7.5/10

Summary

TensorFlow is an open source platform for machine learning. If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack. Fix for this vulnerability was included in TensorFlow 2.10.0. This vulnerability was also fixed in TensorFlow 2.9.2, TensorFlow 2.8.3, and TensorFlow 2.7.4, as these are also affected and still in supported range. There are no known workarounds for this issue. This issue affects versions prior to 2.7.4, 2.8.x prior to 2.8.3, and 2.9.x prior to 2.9.2.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • NONE
  • HIGH

CWE-617 - Reachable Assertion

The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.

Advisory Timeline

  • Published