
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an open source platform for machine learning, was found to contain a vulnerability (CVE-2022-41885) where the tf.raw_ops.FusedResizeAndPadConv2D operation could experience an overflow when provided with large tensor shapes. The vulnerability was discovered by Neophytos Christou from the Secure Systems Lab (SSL) at Brown University and was disclosed on November 18, 2022. This issue affected TensorFlow versions prior to 2.11.0 (GitHub Advisory).
The vulnerability occurs in the FusedResizeAndPadConv2D operation when processing large tensor shapes. The issue manifests when the operation is called with specific parameters including large size values (e.g., [1879048192,1879048192]) that can trigger an integer overflow condition. The vulnerability is tracked as CWE-131 and has been assigned a Low severity rating (GitHub Advisory).
The impact of this vulnerability is considered Low. When exploited, it could cause an overflow condition in the TensorFlow library when processing certain tensor operations, potentially affecting the reliability of machine learning models using this specific operation (GitHub Advisory).
The issue has been patched in multiple TensorFlow versions. The fix was implemented in GitHub commit d66e1d568275e6a2947de97dca7a102a211e01ce and included in TensorFlow 2.11.0. The patch was also backported to versions 2.10.1, 2.9.3, and 2.8.4. Users are advised to upgrade to these patched versions to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."