AVID-2026-R1114
Description
Segfault TFLite converter on per-channel quantized transposed convolutions in TensorFlow (CVE-2022-36027)
Details
TensorFlow is an open source platform for machine learning. When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. We have patched the issue in GitHub commit aa0b852a4588cea4d36b74feb05d93055540b450. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
Reason for inclusion in AVID: CVE-2022-36027 describes a segfault in TensorFlow’s TFLite converter when handling per-channel quantized transposed convolutions, a vulnerability affecting AI software tooling. It impacts a component (TensorFlow / TFLite converter) used to build/deploy AI models, i.e., a software supply chain element for general-purpose AI systems. It is a security-style vulnerability (availability impact, crash) with patched fix and CVE advisory, and the report provides sources (NVD, GitHub advisory, commit). Evidence is sufficient.
References
- NVD entry
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79h2-q768-fpxr
- https://github.com/tensorflow/tensorflow/issues/53767
- https://github.com/tensorflow/tensorflow/commit/aa0b852a4588cea4d36b74feb05d93055540b450
Affected or Relevant Artifacts
- Developer: tensorflow
- Deployer: tensorflow
- Artifact Details:
| Type | Name |
|---|---|
| System | tensorflow |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
| Base Score | 5.9 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🔴 High |
| Privileges Required | NONE |
| User Interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | NONE |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-20 | CWE-20: Improper Input Validation |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-09-16
- Version: 0.3.3
- AVID Entry