CVE-2018-10055: TensorFlow XLA: heap overflow via crafted config file
UNKNOWN PoC AVAILABLEA crafted XLA compiler configuration file can crash TensorFlow processes or leak adjacent memory contents in versions before 1.7.1. If your ML pipelines accept configuration from any external or untrusted source, this is an information disclosure and stability risk. Upgrade to TensorFlow 1.7.1+ immediately; any deployment still on TF 1.x should be treated as end-of-life and migrated.
Risk Assessment
Risk is LOW-MODERATE in modern environments given TensorFlow 1.x is effectively EOL and the attack requires the ability to supply a crafted configuration file to the XLA compiler — typically a privileged operation. However, in shared ML infrastructure (e.g., JupyterHub, MLflow experiment servers, multi-tenant training clusters) where users can submit arbitrary configs, the attack surface widens. The memory read primitive could leak sensitive artifacts from training jobs in collocated environments.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| tensorflow | pip | — | No patch |
Do you use tensorflow? You're affected.
Severity & Risk
Recommended Action
6 steps-
Upgrade TensorFlow to 1.7.1 or later (prefer 2.x LTS).
-
If on TF 1.x for legacy reasons, disable XLA JIT compilation unless strictly required.
-
Validate and whitelist XLA configuration files — reject configs from untrusted sources.
-
Run training workloads in isolated processes/containers to limit blast radius of memory exposure.
-
Audit ML infrastructure for any exposure of TF config endpoints to non-admin users.
-
Detection: monitor for abnormal TF process crashes (SIGSEGV/SIGABRT) correlated with config file ingestion.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2018-10055?
A crafted XLA compiler configuration file can crash TensorFlow processes or leak adjacent memory contents in versions before 1.7.1. If your ML pipelines accept configuration from any external or untrusted source, this is an information disclosure and stability risk. Upgrade to TensorFlow 1.7.1+ immediately; any deployment still on TF 1.x should be treated as end-of-life and migrated.
Is CVE-2018-10055 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2018-10055, increasing the risk of exploitation.
How to fix CVE-2018-10055?
1. Upgrade TensorFlow to 1.7.1 or later (prefer 2.x LTS). 2. If on TF 1.x for legacy reasons, disable XLA JIT compilation unless strictly required. 3. Validate and whitelist XLA configuration files — reject configs from untrusted sources. 4. Run training workloads in isolated processes/containers to limit blast radius of memory exposure. 5. Audit ML infrastructure for any exposure of TF config endpoints to non-admin users. 6. Detection: monitor for abnormal TF process crashes (SIGSEGV/SIGABRT) correlated with config file ingestion.
What systems are affected by CVE-2018-10055?
This vulnerability affects the following AI/ML architecture patterns: training pipelines, model serving, ML infrastructure.
What is the CVSS score for CVE-2018-10055?
No CVSS score has been assigned yet.
Technical Details
NVD Description
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.
Exploitation Scenario
An adversary with access to a shared ML training platform (e.g., via compromised researcher credentials or a multi-tenant JupyterHub) submits a crafted TensorFlow XLA configuration file targeting a co-located training job. The malformed config triggers a heap buffer overflow in the XLA compiler, either crashing the victim's training run (sabotage) or reading adjacent heap memory — potentially capturing model checkpoint data, API keys loaded as environment variables, or fragments of the training dataset in memory.
Weaknesses (CWE)
References
Timeline
Related Vulnerabilities
CVE-2020-15196 9.9 TensorFlow: heap OOB read in sparse/ragged count ops
Same package: tensorflow CVE-2020-15205 9.8 TensorFlow: heap overflow in StringNGrams, ASLR bypass
Same package: tensorflow CVE-2020-15208 9.8 TFLite: OOB read/write via tensor dimension mismatch
Same package: tensorflow CVE-2019-16778 9.8 TensorFlow: heap overflow in UnsortedSegmentSum op
Same package: tensorflow CVE-2022-23587 9.8 TensorFlow: integer overflow in Grappler enables RCE
Same package: tensorflow
AI Threat Alert