Home » Database

AVID-2026-R0976

Description

Out of bounds read and write in Tensorflow (CVE-2022-23574)

Details

Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow’s SpecializeType which results in heap OOB read/write. Due to a typo, arg is initialized to the ith mutable argument in a loop where the loop index is j. Hence it is possible to assign to arg from outside the vector of arguments. Since this is a mutable proto value, it allows both read and write to outside of bounds data. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.

Reason for inclusion in AVID: CVE-2022-23574 describes an out-of-bounds read/write in TensorFlow caused by a typo; TensorFlow is a core AI/ML framework used in AI pipelines, so the issue affects software supply chain of general-purpose AI systems. It is a security vulnerability (CWE-125/787, CVSS high) with explicit evidence and fixes. Therefore it should be kept for AVID curation.

References

Affected or Relevant Artifacts

  • Developer: tensorflow
  • Deployer: tensorflow
  • Artifact Details:
TypeName
Systemtensorflow

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score8.8
Base Severity🔴 High
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-125CWE-125: Out-of-bounds Read
CWE-787CWE-787: Out-of-bounds Write

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2022-02-04
  • Version: 0.3.3
  • AVID Entry