Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35990 : What You Need to Know

Learn about CVE-2022-35990, a vulnerability in TensorFlow's `FakeQuantWithMinMaxVarsPerChannelGradient` function triggering a `CHECK` fail, impacting versions < 2.7.2 and >= 2.8.0.

A detailed overview of the

CHECK
fail vulnerability in
FakeQuantWithMinMaxVarsPerChannelGradient
in TensorFlow and its impact, along with mitigation strategies.

Understanding CVE-2022-35990

This section provides insights into the nature of the vulnerability and its implications.

What is CVE-2022-35990?

TensorFlow, an open-source machine learning platform, is affected by a vulnerability in the

tf.quantization.fake_quant_with_min_max_vars_per_channel_gradient
function. When this function receives input
min
or
max
of rank other than 1, it triggers a
CHECK
fail, potentially leading to a denial of service attack.

The Impact of CVE-2022-35990

The vulnerability's CVSS base score is 5.9, indicating a medium severity issue. With a high attack complexity and impact on availability, the vulnerability poses risks to TensorFlow users.

Technical Details of CVE-2022-35990

Explore the specific technical aspects of the CVE-2022-35990 vulnerability.

Vulnerability Description

The vulnerability stems from erroneous input handling in the

FakeQuantWithMinMaxVarsPerChannelGradient
function, allowing for a denial of service attack.

Affected Systems and Versions

TensorFlow versions prior to 2.7.2, 2.8.1, and 2.9.1 are impacted by this vulnerability, necessitating immediate action.

Exploitation Mechanism

Exploiting this vulnerability requires sending specific inputs to the affected function, potentially disrupting service availability.

Mitigation and Prevention

Discover effective strategies to mitigate the risks associated with CVE-2022-35990.

Immediate Steps to Take

Users are advised to update their TensorFlow installations to version 2.7.2, 2.8.1, 2.9.1, or above to address the vulnerability and prevent potential exploits.

Long-Term Security Practices

Incorporate robust security practices, such as regular software updates and monitoring, to enhance the overall security posture of TensorFlow deployments.

Patching and Updates

Stay informed about security patches and updates released by TensorFlow to address vulnerabilities like CVE-2022-35990, ensuring a secure environment for machine learning operations.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now