Learn about CVE-2022-35971, a vulnerability in TensorFlow impacting versions < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1. Find out the impact, technical details, and mitigation steps.
A detailed overview of the
CHECK fail vulnerability in FakeQuantWithMinMaxVars in TensorFlow affecting certain versions.
Understanding CVE-2022-35971
This CVE highlights a vulnerability in TensorFlow that can be exploited to trigger a denial of service attack.
What is CVE-2022-35971?
TensorFlow, an open source platform for machine learning, is impacted by a flaw in
FakeQuantWithMinMaxVars, leading to a CHECK fail.
The Impact of CVE-2022-35971
The vulnerability poses a medium severity risk with a CVSS base score of 5.9, affecting availability due to a denial of service possibility.
Technical Details of CVE-2022-35971
Exploring the specifics of the vulnerability in TensorFlow.
Vulnerability Description
The issue arises when
FakeQuantWithMinMaxVars is provided min or max tensors of a nonzero rank, resulting in a CHECK fail.
Affected Systems and Versions
Versions of TensorFlow prior to 2.7.2 and between 2.8.0 to 2.8.1 and 2.9.0 to 2.9.1 are impacted by this vulnerability.
Exploitation Mechanism
The vulnerability, when exploited, can be used to trigger a denial of service attack, affecting the availability of the platform.
Mitigation and Prevention
Measures to mitigate and prevent the exploitation of CVE-2022-35971.
Immediate Steps to Take
Users are advised to apply the patches released by TensorFlow to address the vulnerability.
Long-Term Security Practices
Regularly updating TensorFlow to the latest version can help in staying protected from known vulnerabilities.
Patching and Updates
The issue has been patched in TensorFlow 2.10.0, with backports available for TensorFlow 2.9.1, 2.8.1, and 2.7.2 to address the vulnerability.