CVE-2023-25661: TensorFlow Denial of Service vulnerability
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.31172%
CWE
Published
3/27/2023
Updated
9/1/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tensorflow | pip | < 2.11.1 | 2.11.1 |
| tensorflow-cpu | pip | < 2.11.1 | 2.11.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper input validation in the Conv3DTranspose gradient computation. The TensorFlow commit 948fe63 shows added validation checks in conv_grad_ops_3d.cc to handle zero-dimension inputs. The Keras test case addition in 85db5d0 verifies this fix at the API level. The root cause is in the Conv3DBackpropInputOp implementation where missing dimension checks allowed invalid inputs to crash the process. The patched code explicitly checks for zero dimensions and early returns, confirming this as the vulnerable function.