AVID-2026-R0978
Description
Integer overflow in Tensorflow (CVE-2022-23576)
Details
Tensorflow is an Open Source Machine Learning Framework. The implementation of OpLevelCostEstimator::CalculateOutputSize is vulnerable to an integer overflow if an attacker can create an operation which would involve tensors with large enough number of elements. We can have a large enough number of dimensions in output_shape.dim() or just a small number of dimensions being large enough to cause an overflow in the multiplication. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Reason for inclusion in AVID: CVE-2022-23576 is an integer overflow vulnerability in TensorFlow’s OpLevelCostEstimator that affects TensorFlow versions and can impact AI software stacks. TensorFlow is a core AI framework used in training/deploying AI systems; this is a software supply-chain vulnerability in a dependency commonly used in general-purpose AI pipelines. The issue is security-related (overflow, potential crash/DoS) and enough evidence is provided in the advisory, with CVSS metrics and affected versions.
References
- NVD entry
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37
- https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae
- https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617
Affected or Relevant Artifacts
- Developer: tensorflow
- Deployer: tensorflow
- Artifact Details:
| Type | Name |
|---|---|
| System | tensorflow |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| Base Score | 6.5 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🟢 Low |
| Privileges Required | 🟢 Low |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | NONE |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-190 | CWE-190: Integer Overflow or Wraparound |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-02-04
- Version: 0.3.3
- AVID Entry