CVE-2022-21727

HIGH

Google Tensorflow < 2.5.2 - Integer Overflow

Title source: rule
STIX 2.1

Description

Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `Dequantize` is vulnerable to an integer overflow weakness. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked, and, since the code computes `axis + 1`, an attacker can trigger an integer overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.

Scores

CVSS v3 7.6
EPSS 0.0032
EPSS Percentile 54.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-190
Status published
Products (5)
google/tensorflow 2.7.0
google/tensorflow < 2.5.2
pypi/tensorflow 0 - 2.5.3PyPI
pypi/tensorflow-cpu 0 - 2.5.3PyPI
pypi/tensorflow-gpu 0 - 2.5.3PyPI
Published Feb 03, 2022
Tracked Since Feb 18, 2026