{"data":{"id":"0f2415a4-df67-4189-8ae2-ab9c4c65fa77","title":"CVE-2022-29193: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implem","summary":"TensorFlow, an open source platform for machine learning, had a vulnerability in the `tf.raw_ops.TensorSummaryV2` function that failed to properly validate (check the correctness of) input arguments before using them. This flaw could be exploited to cause a denial of service attack (making the system crash or become unavailable) by triggering a CHECK-failure (a forced program halt when an expected condition is not met).","solution":"Update TensorFlow to version 2.9.0, 2.8.1, 2.7.2, or 2.6.4 or later. The source states: 'Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'","labels":["security"],"sourceUrl":"https://nvd.nist.gov/vuln/detail/CVE-2022-29193","publishedAt":"2022-05-21T02:16:40.553Z","cveId":"CVE-2022-29193","cweIds":["CWE-20"],"cvssScore":"5.5","cvssSeverity":"medium","severity":"medium","attackType":["denial_of_service"],"issueType":"vulnerability","affectedPackages":null,"affectedVendors":[],"affectedVendorsRaw":["TensorFlow"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":"unknown","epssScore":0.0004,"patchAvailable":null,"disclosureDate":null,"capecIds":null,"crossRefCount":0,"attackSophistication":"trivial","impactType":["availability"],"aiComponentTargeted":"framework","llmSpecific":false,"classifierConfidence":0.95,"researchCategory":null,"atlasIds":null}}