
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2022-35952 affects TensorFlow versions prior to 2.10.0, specifically in the UnbatchGradOp function. The issue was discovered and reported by Kang Hong Jin from Singapore Management University and 刘力源 from Beijing Institute of Technology. The vulnerability was disclosed on September 15, 2022, and affects multiple TensorFlow packages including tensorflow, tensorflow-cpu, and tensorflow-gpu distributed through pip (GitHub Advisory).
The vulnerability exists in the UnbatchGradOp function where it incorrectly handles two specific parameters: 1) The 'id' parameter that is assumed to be scalar but doesn't validate this assumption, and 2) The 'batchindex' parameter that requires containing three times the number of elements as indicated in its batchindex.dim_size(0) but fails to properly validate this requirement. When these parameters are provided with incorrect values, they can trigger CHECK failures (GitHub Advisory).
When exploited, this vulnerability can cause the program to crash through CHECK failures. This occurs when either a non-scalar id is provided to the UnbatchGradOp function or when an incorrect batch_index is supplied (GitHub Advisory).
The vulnerability has been patched in TensorFlow versions 2.7.4, 2.8.3, 2.9.2, and 2.10.0. The fix was implemented in GitHub commit 5f945fc6409a3c1e90d6970c9292f805f6e6ddf2. Users are advised to upgrade to these patched versions to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."