
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-41888 affects TensorFlow, an open source platform for machine learning. The vulnerability was discovered in the tf.image.generate_bounding_box_proposals function when running on GPU, where the function fails to validate that the 'scores' input parameter must be of rank 4. This vulnerability was disclosed on November 18, 2022, affecting TensorFlow versions prior to 2.11.0 (GitHub Advisory).
The vulnerability exists in the GPU implementation of the generate_bounding_box_proposals function where input validation is missing for the 'scores' parameter rank. The function expects the 'scores' input to be a rank 4 tensor, but this requirement was not enforced, potentially leading to undefined behavior. The issue was fixed by adding explicit rank checks at the beginning of the function implementation (TensorFlow Commit).
The vulnerability could lead to floating-point exceptions (FPE) when incorrect input ranks are provided to the function. This could potentially cause program crashes or unexpected behavior in applications using the affected TensorFlow versions (GitHub Advisory).
The vulnerability has been patched in multiple TensorFlow versions: 2.8.4, 2.9.3, 2.10.1, and 2.11.0. Users should upgrade to these patched versions to resolve the issue. The fix involves adding proper input validation to check the rank of the 'scores' parameter (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."