CVE-2023-25663: TensorFlow has Null Pointer Error in TensorArrayConcatV2
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.34151%
CWE
Published
3/24/2023
Updated
3/27/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tensorflow | pip | < 2.11.1 | 2.11.1 |
| tensorflow-cpu | pip | < 2.11.1 | 2.11.1 |
| tensorflow-gpu | pip | < 2.11.1 | 2.11.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the unvalidated use of ctx->step_container() in GetTensorArray. The original code path (pre-patch) directly executed ctx->step_container()->Lookup(...) without null checking. The patch adds a null check for ScopedStepContainer* sc = ctx->step_container(), confirming this was the vulnerable code path. The CWE-476 classification and crash scenario described in the advisory directly map to this unchecked pointer dereference.