
Cloud Vulnerability DB
A community-led vulnerabilities database
Tensorflow, an Open Source Machine Learning Framework, was found to contain a null pointer dereference vulnerability (CVE-2022-23595) when building an XLA compilation cache using default settings. The vulnerability was discovered and disclosed in February 2022, affecting TensorFlow versions prior to 2.8.0. The issue occurs because in the default scenario where all devices are allowed, the configuration protocol pointer (flr->config_proto) is null (GitHub Advisory).
The vulnerability stems from a null pointer dereference in the BuildXlaCompilationCache function. When using default settings, the code attempts to access gpuoptions().visibledevicelist() through a null configproto pointer, leading to a crash. The issue was assigned a CVSS v3.1 base score of 6.5 (MEDIUM) by NIST NVD, while GitHub assessed it with a score of 5.3 (MEDIUM) (NVD).
The vulnerability can cause the application to crash due to the null pointer dereference, potentially leading to a denial of service condition. This affects systems using TensorFlow's XLA (Accelerated Linear Algebra) compilation functionality with default settings (GitHub Advisory).
The vulnerability was patched in TensorFlow 2.8.0, with backported fixes available in versions 2.7.1, 2.6.3, and 2.5.3. The fix involves checking if the configuration protocol exists before attempting to access it, and using default settings (allowing all devices) when no configuration is present (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."