AVID-2026-R0950
Description
CHECK-failures in Tensorflow (CVE-2022-21734)
Details
Tensorflow is an Open Source Machine Learning Framework. The implementation of MapStage is vulnerable a CHECK-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Reason for inclusion in AVID: CVE-2022-21734 describes a vulnerability in TensorFlow (MapStage CHECK-fail when the key tensor is not a scalar). This is a software vulnerability in a core AI framework used to build/train/deploy AI systems, with backporting to supported versions. It represents a software supply-chain issue in GP AI stacks (TensorFlow libraries/dependencies) and exhibits a vulnerability behavior (potential crash/DoS). The report provides CVE details and advisories as sufficient signals.
References
- NVD entry
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm
- https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d
- https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550
Affected or Relevant Artifacts
- Developer: n/a
- Deployer: n/a
- Artifact Details:
| Type | Name |
|---|---|
| System | n/a |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| Base Score | 6.5 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | 🟢 Low |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | NONE |
| Availability Impact | 🔴 High |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-02-03
- Version: 0.3.3
- AVID Entry