AVID-2026-R1146
Description
tf.raw_ops.Mfcc crashes in Tensorflow (CVE-2022-41896)
Details
TensorFlow is an open source platform for machine learning. If ThreadUnsafeUnigramCandidateSampler is given input filterbank_channel_count greater than the allowed max size, TensorFlow will crash. We have patched the issue in GitHub commit 39ec7eaf1428e90c37787e5b3fbd68ebd3c48860. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Reason for inclusion in AVID: The CVE describes a vulnerability in TensorFlow (CVE-2022-41896) where tf.raw_ops.Mfcc crashes if input filterbank_channel_count exceeds the allowed max. This concerns an AI framework (TensorFlow) and directly affects components used to build/train/deploy AI systems, representing a software supply-chain vulnerability in general-purpose AI stacks. The issue is a reported security vulnerability (availability impact via crash) with accompanying CVE, advisory, and a patch, providing clear evidence for inclusion in AVID. Therefore it meets all four checks (AI-related, GPAI supply chain, security/safety vuln, sufficient evidence).
References
- NVD entry
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rmg2-f698-wq35
- https://github.com/tensorflow/tensorflow/commit/39ec7eaf1428e90c37787e5b3fbd68ebd3c48860
- https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/mirror_pad_op.cc
Affected or Relevant Artifacts
- Developer: tensorflow
- Deployer: tensorflow
- Artifact Details:
| Type | Name |
|---|---|
| System | tensorflow |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H |
| Base Score | 4.8 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🔴 High |
| Privileges Required | 🟢 Low |
| User Interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | NONE |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-20 | CWE-20: Improper Input Validation |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-11-18
- Version: 0.3.3
- AVID Entry