AVID-2026-R1135
Description
Seg fault in ndarray_tensor_bridge due to zero and large inputs in Tensorflow (CVE-2022-41884)
Details
TensorFlow is an open source platform for machine learning. If a numpy array is created with a shape such that one element is zero and the others sum to a large number, an error will be raised. We have patched the issue in GitHub commit 2b56169c16e375c521a3bc8ea658811cc0793784. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Reason for inclusion in AVID: CVE-2022-41884 describes a segmentation fault in TensorFlow (an ML framework) triggered by specific numpy array shapes. TensorFlow is a core component used to build, train, deploy, and run AI systems, placing this vulnerability squarely in the software supply chain for general-purpose AI stacks. The issue results in a crash (availability impact) and is documented with affected versions and a fix/commit, satisfying CVE/NVD evidence. Therefore, it is an AI-related, GPAI-supply-chain vulnerability with verifiable security/safety impact and sufficient evidence.
References
- NVD entry
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636
- https://github.com/tensorflow/tensorflow/commit/2b56169c16e375c521a3bc8ea658811cc0793784
Affected or Relevant Artifacts
- Developer: tensorflow
- Deployer: tensorflow
- Artifact Details:
| Type | Name |
|---|---|
| System | tensorflow |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H |
| Base Score | 4.8 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🔴 High |
| Privileges Required | 🟢 Low |
| User Interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | NONE |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-670 | CWE-670: Always-Incorrect Control Flow Implementation |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-11-18
- Version: 0.3.3
- AVID Entry