Learn about CVE-2022-36012 affecting TensorFlow versions < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1. Find mitigation steps and impact details here.
TensorFlow is an open source platform for machine learning that encountered an assertion failure due to empty function attributes. The issue, identified as CVE-2022-36012, has a base score of 5.9 and a medium severity rating.
Understanding CVE-2022-36012
This CVE highlights a vulnerability in TensorFlow related to empty function attributes causing a crash.
What is CVE-2022-36012?
When
mlir::tfg::ConvertGenericFunctionToFunctionDef
encounters empty function attributes, it triggers a crash in TensorFlow.
The Impact of CVE-2022-36012
The vulnerability has a base score of 5.9, with high availability impact and attack complexity.
Technical Details of CVE-2022-36012
The affected versions of TensorFlow include < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1.
Vulnerability Description
The vulnerability causes TensorFlow to crash when handling empty function attributes.
Affected Systems and Versions
TensorFlow versions < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1 are impacted by this issue.
Exploitation Mechanism
The vulnerability can be exploited when
mlir::tfg::ConvertGenericFunctionToFunctionDef
receives empty function attributes.
Mitigation and Prevention
It is crucial to take immediate steps to address this vulnerability in TensorFlow.
Immediate Steps to Take
Update TensorFlow to version 2.10.0 or apply the fix included in commit ad069af92392efee1418c48ff561fd3070a03d7b.
Long-Term Security Practices
Regularly update TensorFlow and apply security patches to prevent such vulnerabilities.
Patching and Updates
Ensure that TensorFlow is kept up to date to mitigate the risks associated with CVE-2022-36012.