Learn about the critical CVE-2022-35939 affecting TensorFlow Lite < 2.7.2, >= 2.8.0, < 2.8.1, >= 2.9.0, < 2.9.1. Take immediate steps to patch this out-of-bounds write vulnerability.
A detailed overview of the out-of-bounds write vulnerability in the
scatter_nd
op in TensorFlow Lite.
Understanding CVE-2022-35939
This CVE addresses a critical vulnerability in the TensorFlow Lite platform.
What is CVE-2022-35939?
TensorFlow is an open-source platform for machine learning. The issue arises from the
ScatterNd
function, which mishandles input indices, leading to out-of-bounds writes.
The Impact of CVE-2022-35939
The vulnerability has a CVSS base score of 7 (High) and affects versions of TensorFlow Lite < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1. An attacker can exploit this flaw to write content at incorrect indices or trigger a crash.
Technical Details of CVE-2022-35939
Explore the specifics of the vulnerability for a better understanding.
Vulnerability Description
The vulnerability originates from the
scatter_nd
op in TensorFlow Lite, allowing malicious actors to perform out-of-bounds writes.
Affected Systems and Versions
Exploitation Mechanism
The issue occurs due to mishandling of input indices by the
ScatterNd
function, leading to unauthorized writes.
Mitigation and Prevention
Discover how to address and prevent the exploitation of this security vulnerability in TensorFlow Lite.
Immediate Steps to Take
Users are advised to update their TensorFlow Lite installations to version 2.10.0, where the issue has been patched, or apply the fix provided in GitHub commit b4d4b4cb019bd7240a52daa4ba61e3cc814f0384.
Long-Term Security Practices
Developers should prioritize input validation and boundary checks to prevent similar vulnerabilities in the future.
Patching and Updates
Ensure to regularly update TensorFlow Lite to the latest versions to mitigate security risks.