First published: Fri Mar 24 2023(Updated: )
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `ctx->step_containter()` is a null ptr, the Lookup function will be executed with a null pointer. A fix is included in TensorFlow 2.12.0 and 2.11.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google TensorFlow | <2.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25663 is a vulnerability in TensorFlow.
The severity of CVE-2023-25663 is high with a score of 7.5.
CVE-2023-25663 affects TensorFlow versions prior to 2.12.0 and 2.11.1.
To fix CVE-2023-25663, update TensorFlow to versions 2.12.0 or 2.11.1.
More information about CVE-2023-25663 can be found in the following references: [reference 1](https://github.com/tensorflow/tensorflow/commit/239139d2ae6a81ae9ba499ad78b56d9b2931538a) and [reference 2](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-64jg-wjww-7c5w).