Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2494 | TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue. |
Github GHSA |
GHSA-54ch-gjq5-4976 | Segfault due to missing support for quantized types |
Tue, 22 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-22T17:58:30.888Z
Reserved: 2022-04-13T00:00:00.000Z
Link: CVE-2022-29205
Updated: 2024-08-03T06:17:54.256Z
Status : Modified
Published: 2022-05-20T23:15:44.687
Modified: 2024-11-21T06:58:42.727
Link: CVE-2022-29205
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA