Home » Database

AVID-2026-R1025

Description

Denial of service in TensorFlow due to lack of validation in tf.ragged.constant (CVE-2022-29202)

Details

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of tf.ragged.constant does not fully validate the input arguments. This results in a denial of service by consuming all available memory. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

Reason for inclusion in AVID: CVE-2022-29202 describes a memory-exhaustion denial-of-service vulnerability in TensorFlow’s tf.ragged.constant due to input validation issues. TensorFlow is a core AI framework used in ML pipelines, so this is a software supply-chain-relevant issue affecting AI systems. It is a security vulnerability with clear CVE coverage and versioned remediation, supported by references to releases and advisories.

References

Affected or Relevant Artifacts

  • Developer: tensorflow
  • Deployer: tensorflow
  • Artifact Details:
TypeName
Systemtensorflow

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score5.5
Base Severity🟠 Medium
Attack VectorLOCAL
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity ImpactNONE
Availability Impact🔴 High

CWE

IDDescription
CWE-20CWE-20: Improper Input Validation
CWE-400CWE-400: Uncontrolled Resource Consumption

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2022-05-20
  • Version: 0.3.3
  • AVID Entry