VYPR
Moderate severityNVD Advisory· Published May 20, 2022· Updated Apr 22, 2025

Missing validation causes denial of service via `GetSessionTensor` in TensorFlow

CVE-2022-29191

Description

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of tf.raw_ops.GetSessionTensor does not fully validate the input arguments. This results in a CHECK-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tensorflowPyPI
< 2.6.42.6.4
tensorflow-cpuPyPI
< 2.6.42.6.4
tensorflow-gpuPyPI
< 2.6.42.6.4
tensorflowPyPI
>= 2.7.0, < 2.7.22.7.2
tensorflowPyPI
>= 2.8.0, < 2.8.12.8.1
tensorflow-cpuPyPI
>= 2.7.0, < 2.7.22.7.2
tensorflow-cpuPyPI
>= 2.8.0, < 2.8.12.8.1
tensorflow-gpuPyPI
>= 2.7.0, < 2.7.22.7.2
tensorflow-gpuPyPI
>= 2.8.0, < 2.8.12.8.1

Affected products

1

Patches

1
48305e8ffe52

Fix tf.raw_ops.GetSessionTensor vulnerability with invalid handle.

https://github.com/tensorflow/tensorflowAlan LiuApr 28, 2022via ghsa
1 file changed · +2 0
  • tensorflow/core/kernels/session_ops.cc+2 0 modified
    @@ -98,6 +98,8 @@ class GetSessionTensorOp : public OpKernel {
     
       void Compute(OpKernelContext* ctx) override {
         const Tensor& handle = ctx->input(0);
    +    OP_REQUIRES(ctx, TensorShapeUtils::IsScalar(handle.shape()),
    +                errors::InvalidArgument("handle must be scalar"));
         const string& name = handle.scalar<tstring>()();
         Tensor val;
         auto session_state = ctx->session_state();
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.