Discover the impact of CVE-2022-35999 affecting TensorFlow versions < 2.7.2, >= 2.8.0, < 2.8.1, and >= 2.9.0, < 2.9.1. Learn about the `CHECK` fail vulnerability and mitigation steps.
This article discusses the
CHECK
fail vulnerability in Conv2DBackpropInput
in TensorFlow, impacting versions prior to 2.7.2, >= 2.8.0 and < 2.8.1, and >= 2.9.0 and < 2.9.1. The vulnerability can lead to a denial of service attack.
Understanding CVE-2022-35999
This section delves into the specifics of CVE-2022-35999.
What is CVE-2022-35999?
TensorFlow, an open-source machine learning platform, is affected by a vulnerability in
Conv2DBackpropInput
when certain inputs are received, leading to CPU/GPU kernel CHECK
failures.
The Impact of CVE-2022-35999
The vulnerability allows attackers to trigger a denial of service attack, posing a high availability impact. A patch has been released and will be included in TensorFlow 2.10.0.
Technical Details of CVE-2022-35999
This section provides technical insights into CVE-2022-35999.
Vulnerability Description
The
Conv2DBackpropInput
vulnerability arises when empty out_backprop
inputs are processed, resulting in CHECK
failures.
Affected Systems and Versions
Versions of TensorFlow prior to 2.7.2, >= 2.8.0 and < 2.8.1, and >= 2.9.0 and < 2.9.1 are impacted by this vulnerability.
Exploitation Mechanism
The vulnerability can be exploited to launch denial of service attacks by utilizing the
CHECK
fail scenario.
Mitigation and Prevention
This section outlines steps to mitigate and prevent CVE-2022-35999.
Immediate Steps to Take
Users are advised to update to TensorFlow 2.10.0 or apply the patch included in GitHub commit 27a65a43cf763897fecfa5cdb5cc653fc5dd0346.
Long-Term Security Practices
Incorporate regular security updates and stay informed about vulnerabilities within TensorFlow.
Patching and Updates
Ensure prompt installation of patches and updates released by TensorFlow to mitigate the risk of exploitation.