VYPR
Moderate severityNVD Advisory· Published May 20, 2022· Updated Apr 22, 2025

Missing validation causes denial of service via `DeleteSessionTensor` in TensorFlow

CVE-2022-29194

Description

TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of tf.raw_ops.DeleteSessionTensor does not fully validate the input arguments. This results in a CHECK-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tensorflowPyPI
< 2.6.42.6.4
tensorflowPyPI
>= 2.7.0, < 2.7.22.7.2
tensorflowPyPI
>= 2.8.0, < 2.8.12.8.1
tensorflow-cpuPyPI
< 2.6.42.6.4
tensorflow-cpuPyPI
>= 2.7.0, < 2.7.22.7.2
tensorflow-cpuPyPI
>= 2.8.0, < 2.8.12.8.1
tensorflow-gpuPyPI
< 2.6.42.6.4
tensorflow-gpuPyPI
>= 2.7.0, < 2.7.22.7.2
tensorflow-gpuPyPI
>= 2.8.0, < 2.8.12.8.1

Affected products

1

Patches

1
cff267650c6a

Fix tf.raw_ops.DeleteSessionTensor vulnerability with invalid `handle`.

https://github.com/tensorflow/tensorflowAlan LiuApr 28, 2022via ghsa
1 file changed · +2 0
  • tensorflow/core/kernels/session_ops.cc+2 0 modified
    @@ -134,6 +134,8 @@ class DeleteSessionTensorOp : public OpKernel {
     
       void Compute(OpKernelContext* ctx) override {
         const Tensor& handle = ctx->input(0);
    +    OP_REQUIRES(ctx, TensorShapeUtils::IsScalar(handle.shape()),
    +                errors::InvalidArgument("`handle` must be scalar"));
         const string& name = handle.scalar<tstring>()();
         auto session_state = ctx->session_state();
         OP_REQUIRES(ctx, session_state != nullptr,
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.