CVE-2022-35968

Source
https://cve.org/CVERecord?id=CVE-2022-35968
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-35968.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-35968
Aliases
Downstream
Related
Published
2022-09-16T20:40:10Z
Modified
2026-04-22T11:45:28.258968Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
`CHECK` fail in `AvgPoolGrad` in TensorFlow
Details

TensorFlow is an open source platform for machine learning. The implementation of AvgPoolGrad does not fully validate the input orig_input_shape. This results in a CHECK failure which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 3a6ac52664c6c095aa2b114e742b0aa17fdce78f. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/35xxx/CVE-2022-35968.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-617"
    ]
}
References

Affected packages

Git / github.com/tensorflow/tensorflow

Affected ranges

Type
GIT
Repo
https://github.com/tensorflow/tensorflow
Events
Database specific
{
    "cpe": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
    "extracted_events": [
        {
            "introduced": "2.7.0"
        },
        {
            "fixed": "2.7.2"
        },
        {
            "introduced": "2.8.0"
        },
        {
            "fixed": "2.8.1"
        },
        {
            "introduced": "2.9.0"
        },
        {
            "fixed": "2.9.1"
        }
    ],
    "source": [
        "CPE_FIELD",
        "REFERENCES"
    ]
}

Affected versions

v2.*
v2.7.0
v2.7.1
v2.8.0
v2.9.0

Database specific

vanir_signatures
[
    {
        "target": {
            "file": "tensorflow/core/kernels/avgpooling_op.cc"
        },
        "id": "CVE-2022-35968-c6ed17dc",
        "signature_version": "v1",
        "deprecated": false,
        "source": "https://github.com/tensorflow/tensorflow/commit/3a6ac52664c6c095aa2b114e742b0aa17fdce78f",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "280730799654936734780370603237386681417",
                "202571720483222380985886422261280695272",
                "141715577734580526184147106061402481655",
                "153775145187698581367267332633772804421",
                "280730799654936734780370603237386681417",
                "202571720483222380985886422261280695272",
                "178378080126681546179991584077082832316",
                "78831683713685522271268915716074036281",
                "280730799654936734780370603237386681417",
                "202571720483222380985886422261280695272",
                "178378080126681546179991584077082832316",
                "78831683713685522271268915716074036281"
            ]
        }
    }
]
vanir_signatures_modified
"2026-04-22T11:45:28Z"
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-35968.json"