{"id":"BIT-tensorflow-2022-29197","summary":"Missing validation causes denial of service in TensorFlow via `UnsortedSegmentJoin`","details":"TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.","aliases":["CVE-2022-29197","GHSA-hrg5-737c-2p56"],"modified":"2025-05-20T10:02:07.006Z","published":"2024-03-06T11:14:33.868Z","database_specific":{"cpes":["cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"],"severity":"Medium"},"references":[{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/unsorted_segment_join_op.cc#L92-L95"},{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400"},{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/releases/tag/v2.6.4"},{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/releases/tag/v2.7.2"},{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/releases/tag/v2.8.1"},{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/releases/tag/v2.9.0"},{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hrg5-737c-2p56"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29197"}],"affected":[{"package":{"name":"tensorflow","ecosystem":"Bitnami","purl":"pkg:bitnami/tensorflow"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.6.4"},{"introduced":"2.7.0"},{"fixed":"2.7.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/tensorflow/BIT-tensorflow-2022-29197.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}],"schema_version":"1.7.3"}