Discover the impact and mitigation steps for CVE-2022-35984, a TensorFlow vulnerability that could lead to denial of service attacks. Learn how to secure your systems.
A vulnerability has been discovered in TensorFlow that could allow an attacker to trigger a denial of service attack. Find out the impact, technical details, and mitigation steps below.
Understanding CVE-2022-35984
This CVE involves a vulnerability in TensorFlow that can be exploited to launch a denial of service attack.
What is CVE-2022-35984?
TensorFlow's
ParameterizedTruncatedNormal
function has a flaw where providing an invalid shape
type could result in a CHECK
fail, leading to potential denial of service.
The Impact of CVE-2022-35984
The impact of this vulnerability is rated as medium severity with a CVSS base score of 5.9. It has a high availability impact as it can be triggered remotely with no privileges required.
Technical Details of CVE-2022-35984
This section provides more detailed technical information about the vulnerability.
Vulnerability Description
The vulnerability arises due to a type mismatch in the
shape
parameter of ParameterizedTruncatedNormal
in TensorFlow, leading to a denial of service risk.
Affected Systems and Versions
The affected versions include TensorFlow versions < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1.
Exploitation Mechanism
By providing an invalid
shape
parameter of type int64
instead of the expected int32
, an attacker can trigger the vulnerability.
Mitigation and Prevention
Learn how to protect your systems from this vulnerability and what steps to take.
Immediate Steps to Take
Ensure you update TensorFlow to version 2.10.0 to fix the vulnerability. If not possible, apply the patch included in GitHub commit 72180be03447a10810edca700cbc9af690dfeb51.
Long-Term Security Practices
Regularly update TensorFlow to the latest versions to mitigate any known vulnerabilities.
Patching and Updates
Keep an eye on security advisories and apply patches promptly to prevent exploitation.