AVID-2026-R1108
Description
Null-dereference in mlir::tfg::TFOp::nameAttr in TensorFlow (CVE-2022-36014)
Details
TensorFlow is an open source platform for machine learning. When mlir::tfg::TFOp::nameAttr receives null type list attributes, it crashes. We have patched the issue in GitHub commits 3a754740d5414e362512ee981eefba41561a63a6 and a0f0b9a21c9270930457095092f558fbad4c03e5. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Reason for inclusion in AVID: CVE-2022-36014 describes a null-pointer dereference in TensorFlow (mlir::tfg::TFOp::nameAttr) that can cause a crash (DoS). TensorFlow is a core ML framework used to build/train/deploy AI systems, so this vulnerability concerns AI software and its supply chain. The report provides explicit details (affected TensorFlow versions, commits, and patches), indicating a software vulnerability in a component widely used in general-purpose AI stacks. Therefore it satisfies AI-related, GP-AI supply chain, security/safety vulnerability, with sufficient evidence.
References
- NVD entry
- https://github.com/tensorflow/tensorflow/commit/a0f0b9a21c9270930457095092f558fbad4c03e5
- https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/graphdef_import.cc
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7j3m-8g3c-9qqq
- https://github.com/tensorflow/tensorflow/commit/3a754740d5414e362512ee981eefba41561a63a6
Affected or Relevant Artifacts
- Developer: tensorflow
- Deployer: tensorflow
- Artifact Details:
| Type | Name |
|---|---|
| System | tensorflow |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
| Base Score | 5.9 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🔴 High |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | NONE |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-476 | CWE-476: NULL Pointer Dereference |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-09-16
- Version: 0.3.3
- AVID Entry