
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-21736 affects TensorFlow, an Open Source Machine Learning Framework. The vulnerability was discovered in the implementation of SparseTensorSliceDataset, where under certain conditions, it can dereference a nullptr value. The issue was disclosed on February 2, 2022, affecting TensorFlow versions prior to 2.8.0 (GitHub Advisory).
The vulnerability exists in the SparseTensorSliceDataset implementation where three input arguments representing a sparse tensor lack proper validation of their preconditions. This can lead to undefined behavior when dereferencing a null pointer. The issue can be triggered with specific input parameters, such as empty indices and values with a defined dense shape (GitHub Advisory).
When exploited, this vulnerability can cause undefined behavior in TensorFlow applications using the SparseTensorSliceDataset functionality, potentially leading to application crashes or unpredictable behavior (GitHub Advisory).
The issue has been patched in TensorFlow 2.8.0 and backported to versions 2.7.1, 2.6.3, and 2.5.3. Users should upgrade to these patched versions. The fix implements proper validation of the sparse tensor inputs through commit 965b97e4a9650495cda5a8c210ef6684b4b9eceb (GitHub Advisory).
The vulnerability was reported by Faysal Hossain Shezan from the University of Virginia and was assigned a Moderate severity rating (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."