SB2023111649 - Multiple vulnerabilities in TensorFlow



SB2023111649 - Multiple vulnerabilities in TensorFlow

Published: November 16, 2023 Updated: May 4, 2026

Security Bulletin ID SB2023111649
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2022-23592)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to heap out-of-bounds read as the bounds checking is done in a `DCHECK` (which is a no-op during production). A remote user can control the `input_idx` variable such that `ix` would be larger than the number of values in `node_t.args` and read contents of memory on the system.


2) Improper Check for Unusual or Exceptional Conditions (CVE-ID: CVE-2022-23593)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to simplifyBroadcast() function in the MLIR-TFRT infrastructure in TensorFlow is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. A remote attacker can send specially crafted data to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.