
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2022-21726) affects TensorFlow, an Open Source Machine Learning Framework. The issue lies in the implementation of the Dequantize operation, which fails to properly validate the 'axis' parameter value. This vulnerability was discovered by Yu Tian of Qihoo 360 AIVul Team and was disclosed on February 2, 2022. The affected versions include TensorFlow versions prior to 2.8.0 (GitHub Advisory).
The vulnerability stems from insufficient validation of the 'axis' parameter in the Dequantize operation. The axis argument can be -1 (default value) or any positive value, but the implementation lacks proper upper bound checking. This oversight can lead to heap out-of-bounds access when reading past the end of the array containing the input tensor dimensions. The issue occurs in the calculation of predim and postdim values, where the axis value is used without proper bounds checking (GitHub Advisory).
When exploited, this vulnerability can result in heap out-of-bounds access, potentially leading to memory corruption or program crashes. The issue affects applications using TensorFlow's Dequantize operation with maliciously crafted input parameters (GitHub Advisory).
The vulnerability has been patched in TensorFlow versions 2.5.3, 2.6.3, 2.7.1, and 2.8.0. The fix was implemented in GitHub commit 23968a8bf65b009120c43b5ebcceaf52dbc9e943, which adds proper validation for the axis parameter to ensure it is less than the input dimension (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."