Reachable Assertion
CVE-2022-36026
Summary
TensorFlow is an open source platform for machine learning. If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack. Fix for this vulnerability was included in TensorFlow 2.10.0. This vulnerability was also fixed in TensorFlow 2.9.2, TensorFlow 2.8.3, and TensorFlow 2.7.4, as these are also affected and still in supported range. There are no known workarounds for this issue. This issue affects versions prior to 2.7.4, 2.8.x prior to 2.8.3, and 2.9.x prior to 2.9.2.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-617 - Reachable Assertion
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
References
Advisory Timeline
- Published