
Cloud Vulnerability DB
A community-led vulnerabilities database
Tensorflow, an Open Source Machine Learning Framework, was found to contain an integer overflow vulnerability (CVE-2022-23558) discovered in February 2022. The vulnerability affects versions prior to 2.8.0, with the issue specifically located in the TfLiteIntArrayCreate function. The vulnerability was reported by Wang Xuan of Qihoo 360 AIVul Team (GitHub Advisory).
The vulnerability stems from an integer overflow in the TfLiteIntArrayCreate function where TfLiteIntArrayGetSizeInBytes returns an int instead of a size_t. An attacker can manipulate model inputs to cause computed_size to overflow the size of the int datatype. The vulnerability received a CVSS v3.1 Base Score of 8.8 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
The vulnerability could potentially lead to high impacts on confidentiality, integrity, and availability of the system when exploited. The integer overflow could result in memory corruption, potentially leading to code execution or system crashes (GitHub Advisory).
The issue was patched in TensorFlow 2.8.0, with backported fixes available in TensorFlow 2.7.1, 2.6.3, and 2.5.3. The fix involves changing the return type of TfLiteIntArrayGetSizeInBytes from int to size_t to prevent integer overflow. Users are advised to upgrade to these patched versions (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."