
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-23563 is a security vulnerability discovered in TensorFlow, an Open Source Machine Learning Framework. The vulnerability was disclosed on February 4, 2022, and involves the insecure usage of tempfile.mktemp to create temporary files in multiple locations throughout the codebase (NVD, GitHub Advisory).
The vulnerability stems from the use of tempfile.mktemp for temporary file creation, which introduces a Time-of-Check Time-of-Use (TOCTOU) race condition. This occurs because a different process can create the file between the filename check in mktemp and the actual file creation. The vulnerability has been assigned a CVSS v3.1 base score of 6.3 (Medium) by NVD and 7.1 (High) by GitHub, with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N (NVD).
The vulnerability could potentially lead to security issues as malicious processes could exploit the race condition to manipulate files between the check and use operations. Additionally, in several instances where TensorFlow was supposed to create temporary directories, it was creating files instead, introducing a logic bug masked by the mktemp function usage (GitHub Advisory).
The issue has been patched by replacing mktemp with the safer mkstemp/mkdtemp functions, according to the usage pattern. The fix was included in TensorFlow 2.8.0, and was backported to versions 2.7.1, 2.6.3, and 2.5.3. Users are advised to upgrade to these patched versions as soon as possible (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."