CVE-2022-21726

Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantize` does not fully validate the value of `axis` and can result in heap OOB accesses. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked and this results in reading past the end of the array containing the dimensions of the input tensor. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*

History

08 Feb 2022, 20:05

Type Values Removed Values Added
References (MISC) https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943 - (MISC) https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943 - Patch, Third Party Advisory
References (MISC) https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153 - (MISC) https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153 - Exploit, Third Party Advisory
References (CONFIRM) https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w47-xw72 - (CONFIRM) https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w47-xw72 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
CPE cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*
First Time Google tensorflow
Google
CWE CWE-125

03 Feb 2022, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-03 11:15

Updated : 2023-12-10 14:09


NVD link : CVE-2022-21726

Mitre link : CVE-2022-21726

CVE.ORG link : CVE-2022-21726


JSON object : View

Products Affected

google

  • tensorflow
CWE
CWE-125

Out-of-bounds Read