AVID-2026-R1155
Description
Segfault in CompositeTensorVariantToComponents in Tensorflow (CVE-2022-41909)
Details
TensorFlow is an open source platform for machine learning. An input encoded that is not a valid CompositeTensorVariant tensor will trigger a segfault in tf.raw_ops.CompositeTensorVariantToComponents. We have patched the issue in GitHub commits bf594d08d377dc6a3354d9fdb494b32d45f91971 and 660ce5a89eb6766834bdc303d2ab3902aef99d3d. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.
Reason for inclusion in AVID: CVE-2022-41909 describes a segfault in TensorFlow’s CompositeTensorVariantToComponents triggered by an invalid input. TensorFlow is a core AI framework, and the vulnerability is in the software stack used to build, train, deploy, and run general-purpose AI systems. There is clear evidence (CVE entry, advisory references, commit patches) that this is a software vulnerability in a widely-used AI dependency, with a patch and CVSS indicating impact on availability. Although not a remote-exploit RCE, it constitutes a security/safety vulnerability in an AI software supply chain component.
References
- NVD entry
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjx6-v474-2ch9
- https://github.com/tensorflow/tensorflow/commit/660ce5a89eb6766834bdc303d2ab3902aef99d3d
- https://github.com/tensorflow/tensorflow/commit/bf594d08d377dc6a3354d9fdb494b32d45f91971
- https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc
Affected or Relevant Artifacts
- Developer: tensorflow
- Deployer: tensorflow
- Artifact Details:
| Type | Name |
|---|---|
| System | tensorflow |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
CVSS
| Version | 3.1 |
| Vector String | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H |
| Base Score | 4.8 |
| Base Severity | 🟠 Medium |
| Attack Vector | NETWORK |
| Attack Complexity | 🔴 High |
| Privileges Required | 🟢 Low |
| User Interaction | REQUIRED |
| Scope | UNCHANGED |
| Confidentiality Impact | NONE |
| Integrity Impact | NONE |
| Availability Impact | 🔴 High |
CWE
| ID | Description |
|---|---|
| CWE-20 | CWE-20: Improper Input Validation |
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2022-11-18
- Version: 0.3.3
- AVID Entry