Learn about CVE-2022-36004 impacting TensorFlow versions < 2.7.2, >= 2.8.0 and < 2.8.1, and >= 2.9.0 and < 2.9.1. Find out the impact, technical details, and mitigation steps for this vulnerability.
TensorFlow, an open-source machine learning platform, is impacted by a vulnerability in the
tf.random.gamma
function, potentially leading to a denial of service attack. The issue has been patched, but certain versions remain vulnerable.
Understanding CVE-2022-36004
This CVE affects specific versions of TensorFlow due to a vulnerability in the
tf.random.gamma
function that can be exploited for a denial of service attack. The CVSS base score is 5.9, indicating a medium severity issue.
What is CVE-2022-36004?
The vulnerability arises when
tf.random.gamma
is provided with large input shapes and rates, resulting in a CHECK
fail that could be abused by an attacker to trigger a denial of service attack.
The Impact of CVE-2022-36004
The vulnerability poses a high availability impact, with no confidentiality or integrity impact. It requires no user interaction and has a high attack complexity over the network.
Technical Details of CVE-2022-36004
The vulnerability is classified as CWE-617: Reachable Assertion. Affected versions of TensorFlow include < 2.7.2, >= 2.8.0 and < 2.8.1, and >= 2.9.0 and < 2.9.1. The issue has been addressed in TensorFlow 2.10.0, with backports also made to 2.9.1, 2.8.1, and 2.7.2
Vulnerability Description
When
tf.random.gamma
processes large input shape and rates, it can lead to a CHECK
fail, enabling a potential denial of service attack.
Affected Systems and Versions
Systems running TensorFlow versions < 2.7.2, >= 2.8.0 and < 2.8.1, and >= 2.9.0 and < 2.9.1 are vulnerable to this issue.
Exploitation Mechanism
An attacker could exploit this vulnerability by providing large input shapes and rates to
tf.random.gamma
, triggering a CHECK
fail and potentially causing a denial of service.
Mitigation and Prevention
As a response to CVE-2022-36004, immediate steps should be taken to update TensorFlow to version 2.10.0 to eliminate the vulnerability. Additionally, adopting long-term security practices and staying updated on patch releases is crucial.
Immediate Steps to Take
Update TensorFlow to version 2.10.0 to ensure the vulnerability is mitigated.
Long-Term Security Practices
Regularly monitor for security advisories, apply patches promptly, and follow secure coding practices to minimize the risk of such vulnerabilities.
Patching and Updates
Stay informed on security updates from TensorFlow, especially related to CVE-2022-36004, and apply patches as soon as they are released.