
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow's implementation of tf.raw_ops.QuantizedConv2D contained a vulnerability (CVE-2022-29201) that was discovered and disclosed in May 2022. The vulnerability affected versions prior to 2.9.0, where the function did not properly validate input arguments, leading to potential undefined behavior. When empty arguments were provided, references would get bound to nullptr, creating a security risk (GitHub Advisory).
The vulnerability existed in the input validation mechanism of the QuantizedConv2D operation. When certain input arguments were empty, such as min_input with shape=[0], the implementation would incorrectly bind references to nullptr instead of properly validating these inputs. This affected the handling of quantized convolution operations in TensorFlow (GitHub Advisory).
The impact of this vulnerability was rated as Low severity. While it could lead to undefined behavior in applications using the QuantizedConv2D operation, the exploitation potential was limited as it required the ability to provide specific malformed inputs to the affected function (GitHub Advisory).
The vulnerability was patched in multiple TensorFlow versions: 2.9.0, 2.8.1, 2.7.2, and 2.6.4. The fix was implemented through GitHub commit 0f0b080ecde4d3dfec158d6f60da34d5e31693c4, which added proper input validation to prevent nullptr references (TF Release, GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."