
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2022-23593) affects the simplifyBroadcast function in TensorFlow's MLIR-TFRT infrastructure. Discovered and disclosed in February 2022, this vulnerability impacts TensorFlow version 2.8.0. The issue occurs when the function is called with scalar shapes, leading to a potential segmentation fault (GitHub Advisory).
The vulnerability stems from a logic error in the simplifyBroadcast function where if all shapes are scalar, maxRank becomes 0, resulting in the creation of an empty SmallVector. This condition leads to a segmentation fault when attempting to process the vector. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 HIGH by NVD and 5.9 MEDIUM by GitHub, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
The primary impact of this vulnerability is a denial of service condition through segmentation fault when processing scalar shapes in TensorFlow's MLIR-TFRT infrastructure. The vulnerability affects availability but does not compromise confidentiality or integrity of the system (GitHub Advisory).
The vulnerability has been patched in GitHub commit 35f0fabb4c178253a964d7aabdbb15c6a398b69a. The fix was included in TensorFlow 2.8.0, which is the only affected version. Users should ensure they are using the patched version of TensorFlow (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."