Discover how CVE-2022-23595 impacts TensorFlow versions >= 2.5.3, >= 2.6.0 and < 2.6.3, and >= 2.7.0 and < 2.7.1. Learn about the high-risk vulnerability's technical details, impact, and mitigation steps.
TensorFlow, an open-source machine learning framework, was found to trigger a null pointer dereference when building an XLA compilation cache. This vulnerability, assigned CVE-2022-23595, affects versions >= 2.5.3, >= 2.6.0 and < 2.6.3, and >= 2.7.0 and < 2.7.1. The issue arises from default settings allowing all devices, leading to a null
flr->config_proto
. A fix is scheduled in TensorFlow 2.8.0, with backported patches for versions 2.7.1, 2.6.3, and 2.5.3 still within the supported range.
Understanding CVE-2022-23595
This section delves into the impact, technical details, and mitigation strategies related to the null pointer dereference vulnerability in TensorFlow.
What is CVE-2022-23595?
CVE-2022-23595 is a vulnerability in TensorFlow that results in a null pointer dereference during the XLA compilation cache building process, triggered by default settings allowing all devices, causing
flr->config_proto
to be null.
The Impact of CVE-2022-23595
The impact of this vulnerability is rated as medium severity with a CVSS base score of 5.3. With high attack complexity, network-based attack vector, and high availability impact. However, it requires low privileges and no user interaction.
Technical Details of CVE-2022-23595
Explore the specifics of the vulnerability, including the description, affected systems, versions, and exploitation mechanism.
Vulnerability Description
The vulnerability in TensorFlow allows a null pointer dereference due to default settings permitting all devices, leading to a null
flr->config_proto
. Versions >= 2.5.3, >= 2.6.0 and < 2.6.3, and >= 2.7.0 and < 2.7.1 are impacted.
Affected Systems and Versions
The vulnerability affects TensorFlow versions: >= 2.5.3, >= 2.6.0 and < 2.6.3, and >= 2.7.0 and < 2.7.1.
Exploitation Mechanism
The exploitation of this vulnerability involves building an XLA compilation cache using default settings in TensorFlow, allowing all devices and triggering the null pointer dereference.
Mitigation and Prevention
Learn how to address and prevent the CVE-2022-23595 vulnerability in TensorFlow.
Immediate Steps to Take
To mitigate the vulnerability, users are advised to update to TensorFlow 2.8.0 once the fix is available. For versions 2.7.1, 2.6.3, and 2.5.3, apply the backported patches provided by TensorFlow.
Long-Term Security Practices
In the long term, it is essential to stay updated on security advisories from TensorFlow and promptly implement patches and updates to address known vulnerabilities.
Patching and Updates
Regularly check for security advisories and updates from TensorFlow to ensure your system is protected against potential threats.