VYPR
Moderate severityNVD Advisory· Published Feb 4, 2022· Updated Apr 22, 2025

`CHECK`-failures in binary ops in Tensorflow

CVE-2022-23583

Description

Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a SavedModel such that any binary op would trigger CHECK failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the dtype no longer matches the dtype expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved. If Tin and Tout don't match the type of data in out and input_* tensors then flat<*> would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a CHECK crash, hence a denial of service. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tensorflowPyPI
< 2.5.32.5.3
tensorflowPyPI
>= 2.6.0, < 2.6.32.6.3
tensorflowPyPI
>= 2.7.0, < 2.7.12.7.1
tensorflow-cpuPyPI
< 2.5.32.5.3
tensorflow-cpuPyPI
>= 2.6.0, < 2.6.32.6.3
tensorflow-cpuPyPI
>= 2.7.0, < 2.7.12.7.1
tensorflow-gpuPyPI
< 2.5.32.5.3
tensorflow-gpuPyPI
>= 2.6.0, < 2.6.32.6.3
tensorflow-gpuPyPI
>= 2.7.0, < 2.7.12.7.1

Affected products

1

Patches

1
a7c02f1a9bbc

Validate real and expected type of arguments to cwise ops.

https://github.com/tensorflow/tensorflowMihai MaruseacNov 12, 2021via ghsa
1 file changed · +10 0
  • tensorflow/core/kernels/cwise_ops_common.h+10 0 modified
    @@ -87,7 +87,17 @@ class BinaryOp : public BinaryOpShared {
     
       void Compute(OpKernelContext* ctx) override {
         const Tensor& input_0 = ctx->input(0);
    +    OP_REQUIRES(ctx, input_0.dtype() == DataTypeToEnum<Tin>::v(),
    +                errors::InvalidArgument(
    +                    "Expected tensor of type ",
    +                    DataTypeString(DataTypeToEnum<Tin>::v()), " but got type ",
    +                    DataTypeString(input_0.dtype())));
         const Tensor& input_1 = ctx->input(1);
    +    OP_REQUIRES(ctx, input_1.dtype() == DataTypeToEnum<Tin>::v(),
    +                errors::InvalidArgument(
    +                    "Expected tensor of type ",
    +                    DataTypeString(DataTypeToEnum<Tin>::v()), " but got type ",
    +                    DataTypeString(input_1.dtype())));
         const Device& eigen_device = ctx->eigen_device<Device>();
         bool error = false;
         bool* const error_ptr = Functor::has_errors ? &error : nullptr;
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.