CVE-2022-35985:
TensorFlow vulnerable to `CHECK` fail in `LRNGrad`
5.9
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
9/16/2022
Updated
1/28/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
tensorflow | pip | < 2.7.2 | 2.7.2 |
tensorflow | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
tensorflow | pip | >= 2.9.0, < 2.9.1 | 2.9.1 |
tensorflow-cpu | pip | < 2.7.2 | 2.7.2 |
tensorflow-cpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
tensorflow-cpu | pip | >= 2.9.0, < 2.9.1 | 2.9.1 |
tensorflow-gpu | pip | < 2.7.2 | 2.7.2 |
tensorflow-gpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
tensorflow-gpu | pip | >= 2.9.0, < 2.9.1 | 2.9.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the LRNGradOp implementation where dimension count validation was incomplete. The commit diff shows the critical fix added 'out_image.dims() == 4' to the validation checks. The original code only verified dimension sizes matched input tensors but didn't enforce the 4D requirement explicitly. This matches the vulnerability description where non-4D output_image triggers a CHECK failure. The affected function is clearly identified in the kernel code where the validation occurs.