Miggo Logo

CVE-2022-36017: TensorFlow vulnerable to segfault in `Requantize`

5.9

CVSS Score
3.1

Basic Information

EPSS Score
0.42573%
Published
9/16/2022
Updated
1/30/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
tensorflowpip< 2.7.22.7.2
tensorflowpip>= 2.8.0, < 2.8.12.8.1
tensorflowpip>= 2.9.0, < 2.9.12.9.1
tensorflow-cpupip< 2.7.22.7.2
tensorflow-cpupip>= 2.8.0, < 2.8.12.8.1
tensorflow-cpupip>= 2.9.0, < 2.9.12.9.1
tensorflow-gpupip< 2.7.22.7.2
tensorflow-gpupip>= 2.8.0, < 2.8.12.8.1
tensorflow-gpupip>= 2.9.0, < 2.9.12.9.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing rank validation in RequantizeOp.Compute function. The commit diff shows added OP_REQUIRES checks to enforce scalar inputs, and the CVE description specifically identifies improper handling of non-scalar tensors in Requantize. The PoC demonstrates triggering the issue through non-scalar tensor inputs, which would pass through this function's unpatched version.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t I* `R*qu*ntiz*` is *iv*n `input_min`, `input_m*x`, `r*qu*st**_output_min`, `r*qu*st**_output_m*x` t*nsors o* * nonz*ro r*nk, it r*sults in * s****ult t**t **n ** us** to tri***r * **ni*l o* s*rvi** *tt**k. ```pyt*on import t*nsor*low *s t*

Reasoning

T** vuln*r**ility st*ms *rom missin* r*nk v*li**tion in `R*qu*ntiz*Op.*omput*` *un*tion. T** *ommit *i** s*ows ***** `OP_R*QUIR*S` ****ks to *n*or** s**l*r inputs, *n* t** *V* **s*ription sp**i*i**lly i**nti*i*s improp*r **n*lin* o* non-s**l*r t*nsor