aisecwatch.com
DashboardVulnerabilitiesNewsResearchArchiveStatsDataset
aisecwatch.com

Real-time AI security monitoring. Tracking AI-related vulnerabilities, safety and security incidents, privacy risks, research developments, and policy changes.

Navigation

VulnerabilitiesNewsResearchDigest ArchiveNewsletter ArchiveSubscribeData SourcesStatisticsDatasetAPIIntegrationsWidgetRSS Feed

Maintained by

Truong (Jack) Luu

Information Systems Researcher

Browse All

All tracked items across vulnerabilities, news, research, incidents, and regulatory updates.

to
Export CSV
3335 items

CVE-2022-21738: Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` can be made to

mediumvulnerability
security
Feb 3, 2022
CVE-2022-21738

TensorFlow, an open source machine learning framework, has a vulnerability in its `SparseCountSparseOutput` function where an integer overflow (a number becoming too large for its storage space) can crash the TensorFlow process during memory allocation. This vulnerability affects multiple versions of TensorFlow.

Fix: The fix will be included in TensorFlow 2.8.0. TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 will also receive this fix through a cherry-pick (applying the same fix to older supported versions).

NVD/CVE Database

CVE-2022-21737: Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount` operations allows malicious u

mediumvulnerability
security
Feb 3, 2022
CVE-2022-21737

TensorFlow (an open-source machine learning framework) has a vulnerability in its Bincount operations that allows attackers to crash the system (denial of service) by sending specially crafted arguments that trigger internal safety checks to fail. The problem occurs because some invalid input conditions aren't caught early enough during the system's processing stages, leading to crashes when the system tries to allocate memory for output data.

CVE-2022-23569: Tensorflow is an Open Source Machine Learning Framework. Multiple operations in TensorFlow can be used to trigger a deni

mediumvulnerability
security
Feb 3, 2022
CVE-2022-23569

TensorFlow (an open-source machine learning framework) has a vulnerability where certain operations can crash the program through denial of service attacks (making it unavailable by triggering assertion failures, which are safety checks in code that stop execution if something goes wrong). The developers have fixed the issue and plan to release patches across multiple supported versions.

CVE-2022-21735: Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalMaxPool` can be made to crash

mediumvulnerability
security
Feb 3, 2022
CVE-2022-21735

TensorFlow, an open-source machine learning framework, has a vulnerability in its `FractionalMaxPool` function (a pooling operation used in neural networks) that can crash the program through a division by zero error (attempting to divide a number by zero, which is mathematically undefined). The vulnerability affects multiple versions of TensorFlow.

CVE-2022-21734: Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail i

mediumvulnerability
security
Feb 3, 2022
CVE-2022-21734

TensorFlow, an open-source machine learning framework, has a vulnerability in its `MapStage` component where a CHECK-fail (a type of crash caused by a failed validation check) occurs if the key tensor (a multi-dimensional array of data) is not a scalar (a single value). This bug can cause the program to crash unexpectedly.

CVE-2022-21729: Tensorflow is an Open Source Machine Learning Framework. The implementation of `UnravelIndex` is vulnerable to a divisio

mediumvulnerability
security
Feb 3, 2022
CVE-2022-21729

TensorFlow, an open-source machine learning framework, has a vulnerability in its `UnravelIndex` function caused by an integer overflow bug (a situation where a number becomes too large for the system to handle correctly) that leads to division by zero. This flaw affects multiple versions of TensorFlow and could allow attackers to crash or disrupt the software.

CVE-2022-21725: Tensorflow is an Open Source Machine Learning Framework. The estimator for the cost of some convolution operations can b

mediumvulnerability
security
Feb 3, 2022
CVE-2022-21725

TensorFlow (an open-source machine learning framework) has a bug where a cost estimator for convolution operations can be forced to divide by zero because it doesn't check that the stride argument (a parameter controlling step size in operations) is positive. The fix adds validation to ensure the stride is valid before the operation runs.

CVE-2022-23568: Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable

mediumvulnerability
security
Feb 3, 2022
CVE-2022-23568

TensorFlow (an open-source machine learning framework) has a vulnerability in the `AddManySparseToTensorsMap` function where an integer overflow (when a number gets too large for its storage space) causes the program to crash when creating new TensorShape objects. The problem exists because the code doesn't properly validate input tensor shapes before using them.

CVE-2022-23567: Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to in

mediumvulnerability
security
Feb 3, 2022
CVE-2022-23567

TensorFlow, an open-source machine learning framework, has a vulnerability in its `Sparse*Cwise*` operations (specialized math functions for sparse tensors, a type of data structure with mostly empty values) that can be exploited through integer overflows (when calculations produce numbers too large for the system to handle). An attacker could cause the system to run out of memory or crash by providing specially crafted input dimensions.

CVE-2022-21736: Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefin

highvulnerability
security
Feb 3, 2022
CVE-2022-21736

TensorFlow, an open-source machine learning framework, has a bug in the `SparseTensorSliceDataset` component where it can crash by dereferencing a null pointer (accessing memory that doesn't exist) when given certain inputs. The code doesn't properly check that its three input arguments meet required conditions before using them.

CVE-2022-21733: Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a d

mediumvulnerability
security
Feb 3, 2022
CVE-2022-21733

A bug in TensorFlow's `StringNGrams` function (a tool that breaks text into small overlapping pieces) allows attackers to crash the system by causing it to run out of memory through an integer overflow (when a number gets too large and wraps around to an incorrect value). The problem stems from missing validation on the `pad_width` parameter, which can result in a negative `ngram_width` value that causes excessive memory allocation.

CVE-2022-21732: Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoolHandle` can be used to trigger

mediumvulnerability
security
Feb 3, 2022
CVE-2022-21732

TensorFlow (an open source machine learning framework) has a vulnerability in its `ThreadPoolHandle` component that allows attackers to cause a denial of service attack (making a service unavailable by overwhelming it) by allocating excessive memory. The problem exists because the code only checks that the `num_threads` argument is not negative, but does not limit how large the value can be.

CVE-2022-21731: Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be use

mediumvulnerability
security
Feb 3, 2022
CVE-2022-21731

TensorFlow, an open-source machine learning framework, has a bug in its shape inference (the process of figuring out data dimensions) for the `ConcatV2` operation that can be exploited to crash a program through a segfault (a memory access error). The vulnerability occurs because a type confusion (mixing up different data types) allows a negative value to bypass a safety check, potentially letting attackers cause a denial of service attack (making the system unavailable).

CVE-2022-21730: Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalAvgPoolGrad` does not consider

highvulnerability
security
Feb 3, 2022
CVE-2022-21730

TensorFlow, an open-source machine learning framework, has a vulnerability in its `FractionalAvgPoolGrad` function that fails to validate input data properly, allowing an attacker to read memory from outside the intended bounds of the heap (out-of-bounds read, where a program accesses data it shouldn't). This is a memory safety issue that could let attackers access sensitive information.

CVE-2022-21728: Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` doe

highvulnerability
security
Feb 3, 2022
CVE-2022-21728

TensorFlow, an open source machine learning framework, has a bug in its shape inference for the `ReverseSequence` operation where it doesn't properly check if the `batch_dim` parameter is a negative number, allowing it to read memory outside the intended array bounds (a heap OOB read, or out-of-bounds read that accesses invalid memory). While the code checks that `batch_dim` isn't larger than the input rank, it fails to reject negative values that are too extreme, which can cause the program to access memory before the start of the array.

CVE-2022-21727: Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `Dequantize` is vulne

highvulnerability
security
Feb 3, 2022
CVE-2022-21727

TensorFlow, an open source machine learning framework, has a vulnerability in its shape inference for the `Dequantize` operation where the `axis` argument is not properly validated. An attacker can provide an unexpectedly large `axis` value that causes an integer overflow (when a number becomes too large and wraps around to a negative or incorrect value) when the code adds 1 to it.

CVE-2022-21726: Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantize` does not fully validate the

highvulnerability
security
Feb 3, 2022
CVE-2022-21726

TensorFlow, an open-source machine learning framework, has a bug in its `Dequantize` function where the `axis` parameter (which specifies which dimension to operate on) isn't properly validated. This allows attackers to read past the end of an array in memory, potentially causing crashes or exposing sensitive data through a heap OOB (out-of-bounds) access, which means reading memory locations outside the intended storage area.

CVE-2022-22310: IBM WebSphere Application Server Liberty 21.0.0.10 through 21.0.0.12 could provide weaker than expected security. A remo

mediumvulnerability
security
Jan 19, 2022
CVE-2022-22310

IBM WebSphere Application Server Liberty versions 21.0.0.10 through 21.0.0.12 have a security weakness that allows remote attackers (attackers from outside the system) to obtain sensitive information and gain unauthorized access to JAX-WS applications (a type of web service technology). The vulnerability received an IBM security ID of 217224 but has not yet been assigned a CVSS score (a standard 0-10 rating of how severe a vulnerability is).

CVE-2022-21299: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supp

mediumvulnerability
security
Jan 19, 2022
CVE-2022-21299

A vulnerability (CVE-2022-21299) exists in Oracle Java SE and Oracle GraalVM Enterprise Edition in the JAXP component (a Java library for processing XML), affecting versions like Java 8u311 and 11.0.13. An attacker without authentication can exploit this over the network to partially disrupt (denial of service) the affected Java applications, especially those running untrusted code from the internet.

CVE-2022-21296: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supp

mediumvulnerability
security
Jan 19, 2022
CVE-2022-21296

A vulnerability in Oracle Java SE and Oracle GraalVM Enterprise Edition's JAXP component (a Java library for processing XML data) allows an attacker on the network to read some data they shouldn't have access to without needing to log in. The vulnerability affects several older versions of Java and can be exploited through web services or untrusted code running in a Java sandbox (a restricted environment meant to safely run untrusted programs).

Previous139 / 167Next

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be backported (applied to older versions) in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. Patches will also be cherry-picked (applied retroactively) to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 will also receive this fix through a cherrypick commit, as these versions are still supported.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The vulnerability will also be patched in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, which are still in the supported range.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 will also receive this fix through a cherrypick (applying a specific code change to older versions).

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be back-ported to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, which are still in the supported range.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be applied to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 through a cherrypick (applying specific code changes to older versions).

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be backported (applied to older versions) in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be applied to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, which are still in the supported range.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 will also receive this fix through cherrypicked commits (backports of the fix to older versions still being supported).

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0 and will also be backported to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 (which are still supported versions).

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The fix will also be applied to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 through backports (applying the same fix to older supported versions).

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. Security patches will also be backported to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, which are still in the supported range.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0 and will also be applied to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 through cherrypicking (applying the same commit to older versions).

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. It will also be backported (applied to earlier versions) to TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3.

NVD/CVE Database

Fix: The fix will be included in TensorFlow 2.8.0. The vulnerability will also be patched in TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3 through backported commits (cherrypicks).

NVD/CVE Database
NVD/CVE Database
NVD/CVE Database
NVD/CVE Database