TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a positive scalar but there is no validation. Since this value is used to allocate the output tensor, a negative value would result in a `CHECK`-failure (assertion failure), as per TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
We have discovered 59 live websites that are affected by CVE-2022-29204.
| Product | |
| Category | JavaScript Libraries |
| Vulnerable Domains | 59 live websites (100% of tensorflow install base) |
| Vulnerable Versions |
|
| Vulnerable Versions Count | 0 versions ( less than 0.1% of all versions) |
| 43 websites | |
| 4 websites | |
| 2 websites | |
| 2 websites | |
| 1 websites | |
| 1 websites | |
| 1 websites | |
| 1 websites | |
| 1 websites | |
| 1 websites |
| .com | 28 websites |
| .io | 2 websites |
| .org | 2 websites |
| .at | 1 websites |
| .ch | 1 websites |
| .de | 1 websites |
| .dk | 1 websites |
| .net | 1 websites |
| Domain | Country | Rank | Contacts |
|---|---|---|---|
| ************.com | ***,*** | ||
| *******.************.de | ***,*** | ||
| ******.me | *,***,*** | ||
| ***********.com | *,***,*** | ||
| ************.com | *,***,*** | ||
| ***********.com | *,***,*** | ||
| *******.**.kr | *,***,*** | ||
| **********.com | *,***,*** | ||
| *********.******.**********.org | *,***,*** | ||
| ***********.com | *,***,*** |
FAQ