
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-36002 is a vulnerability in TensorFlow's Unbatch operation that was discovered and disclosed in September 2022. The vulnerability affects TensorFlow versions prior to 2.10.0, including versions 2.7.x, 2.8.x, and 2.9.x. When the Unbatch operation receives a non-scalar input ID, it triggers a CHECK failure that could lead to a denial of service condition (GitHub Advisory).
The vulnerability occurs in the Unbatch operation when it receives a non-scalar input for the ID parameter. The issue lies in the insufficient validation of input parameters, where the code fails to properly check whether the input ID is a scalar before attempting to extract its value. This results in a CHECK failure that can crash the application (GitHub Commit).
The primary impact of this vulnerability is the potential for denial of service attacks. When exploited, the vulnerability causes the application to crash due to the CHECK failure, disrupting the normal operation of TensorFlow-based applications (GitHub Advisory).
The vulnerability has been patched in TensorFlow versions 2.7.4, 2.8.3, 2.9.2, and 2.10.0. The fix involves adding proper input validation to check whether the input ID is scalar before processing it. Users are advised to upgrade to these patched versions to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."