
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an open source platform for machine learning, was found to contain a vulnerability (CVE-2022-41896) where if ThreadUnsafeUnigramCandidateSampler is given input filterbank_channel_count greater than the allowed max size, the application would crash. The vulnerability was discovered by Yu Tian from Qihoo 360 AIVul Team and was disclosed on November 18, 2022. The affected versions include TensorFlow versions below 2.11.0 (GitHub Advisory).
The vulnerability occurs when the MfccMelFilterbank initialization fails due to the number of requested channels being greater than or equal to the maximum value an integer can take. The issue was addressed in GitHub commit 39ec7eaf1428e90c37787e5b3fbd68ebd3c48860, which added checks to fail initialization when the number of channels exceeds the vector's maximum size (GitHub Commit).
When exploited, this vulnerability causes TensorFlow to crash when processing input with filterbankchannelcount greater than the allowed maximum size. This could potentially lead to denial of service in applications utilizing the affected TensorFlow components (GitHub Advisory).
The vulnerability has been patched in multiple TensorFlow versions: 2.11.0, 2.10.1, 2.9.3, and 2.8.4. Users are advised to upgrade to these patched versions to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."