CVE-2022-23568
Python vulnerability analysis and mitigation

Overview

CVE-2022-23568 affects TensorFlow, an Open Source Machine Learning Framework. The vulnerability was discovered in the implementation of AddManySparseToTensorsMap function, which was found to be vulnerable to an integer overflow condition. The issue was disclosed on February 2, 2022, affecting TensorFlow versions prior to 2.8.0. The vulnerability impacts multiple versions of TensorFlow including versions up to 2.5.2, versions from 2.6.0 to 2.6.2, and version 2.7.0 (NVD, GitHub Advisory).

Technical details

The vulnerability stems from missing validation on the shapes of input tensors and direct construction of large TensorShape objects with user-provided dimensions. When building new TensorShape objects, the integer overflow results in a CHECK-fail, leading to an assert failure-based denial of service. The issue can be triggered by providing specific input parameters to the AddManySparseToTensorsMap function. The vulnerability has been assigned a CVSS v3.1 base score of 6.5 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The primary impact of this vulnerability is a denial of service condition through assert failure. When exploited, the integer overflow can cause the application to fail when attempting to build new TensorShape objects, potentially disrupting the normal operation of TensorFlow applications (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in multiple versions of TensorFlow. The fix is included in TensorFlow 2.8.0, and has been backported to TensorFlow 2.7.1, 2.6.3, and 2.5.3. The fix involves replacing the direct call to TensorShape constructor with a call to BuildTensorShape static helper factory, as implemented in commits a68f68061e263a88321c104a6c911fe5598050a8 and b51b82fe65ebace4475e3c54eb089c18a4403f1c (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22612HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22609HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22608HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22690LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management