Learn about CVE-2022-35971, a vulnerability in TensorFlow impacting versions < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1. Find out the impact, technical details, and mitigation steps.
A detailed overview of the
CHECK
fail vulnerability in FakeQuantWithMinMaxVars
in TensorFlow affecting certain versions.
Understanding CVE-2022-35971
This CVE highlights a vulnerability in TensorFlow that can be exploited to trigger a denial of service attack.
What is CVE-2022-35971?
TensorFlow, an open source platform for machine learning, is impacted by a flaw in
FakeQuantWithMinMaxVars
, leading to a CHECK
fail.
The Impact of CVE-2022-35971
The vulnerability poses a medium severity risk with a CVSS base score of 5.9, affecting availability due to a denial of service possibility.
Technical Details of CVE-2022-35971
Exploring the specifics of the vulnerability in TensorFlow.
Vulnerability Description
The issue arises when
FakeQuantWithMinMaxVars
is provided min
or max
tensors of a nonzero rank, resulting in a CHECK
fail.
Affected Systems and Versions
Versions of TensorFlow prior to 2.7.2 and between 2.8.0 to 2.8.1 and 2.9.0 to 2.9.1 are impacted by this vulnerability.
Exploitation Mechanism
The vulnerability, when exploited, can be used to trigger a denial of service attack, affecting the availability of the platform.
Mitigation and Prevention
Measures to mitigate and prevent the exploitation of CVE-2022-35971.
Immediate Steps to Take
Users are advised to apply the patches released by TensorFlow to address the vulnerability.
Long-Term Security Practices
Regularly updating TensorFlow to the latest version can help in staying protected from known vulnerabilities.
Patching and Updates
The issue has been patched in TensorFlow 2.10.0, with backports available for TensorFlow 2.9.1, 2.8.1, and 2.7.2 to address the vulnerability.