Skip to main content

CVE-2022-41897: CWE-125: Out-of-bounds Read in tensorflow tensorflow

Medium
Published: Fri Nov 18 2022 (11/18/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: tensorflow
Product: tensorflow

Description

TensorFlow is an open source platform for machine learning. If `FractionMaxPoolGrad` is given outsize inputs `row_pooling_sequence` and `col_pooling_sequence`, TensorFlow will crash. We have patched the issue in GitHub commit d71090c3e5ca325bdf4b02eb236cfb3ee823e927. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.

AI-Powered Analysis

AILast updated: 06/21/2025, 21:07:44 UTC

Technical Analysis

CVE-2022-41897 is a medium-severity vulnerability in TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The vulnerability is classified as CWE-125, an out-of-bounds read error. Specifically, the issue arises in the `FractionMaxPoolGrad` operation when it receives improperly sized inputs for `row_pooling_sequence` and `col_pooling_sequence`. These inputs, if out of expected bounds, cause TensorFlow to perform an out-of-bounds read, which leads to a crash of the TensorFlow process. This crash can result in denial of service (DoS) conditions in applications relying on TensorFlow for machine learning tasks. The vulnerability affects TensorFlow versions prior to 2.8.4, versions 2.9.0 up to but not including 2.9.3, and versions 2.10.0 up to but not including 2.10.1. The issue has been patched in TensorFlow 2.11 and backported to supported versions 2.10.1, 2.9.3, and 2.8.4. There are no known exploits in the wild at this time, and exploitation requires feeding malformed inputs to the vulnerable TensorFlow operation. Since TensorFlow is often embedded within larger applications or services, the vulnerability could be triggered remotely if the application exposes interfaces that accept untrusted input for TensorFlow processing. However, exploitation typically requires some level of control over input data to the machine learning pipeline. The vulnerability primarily impacts availability due to crashes but does not directly lead to confidentiality or integrity breaches. The fix involves validating input sizes to prevent out-of-bounds memory access during the gradient computation of the FractionMaxPool operation.

Potential Impact

For European organizations, the impact of CVE-2022-41897 depends largely on their reliance on TensorFlow for critical machine learning workloads. Organizations in sectors such as finance, healthcare, automotive, and manufacturing that use TensorFlow for real-time analytics, predictive modeling, or AI-driven automation could experience service disruptions if this vulnerability is exploited. A successful attack could cause denial of service by crashing TensorFlow processes, potentially halting AI-driven services or workflows. This could lead to operational downtime, loss of productivity, and in some cases, impact safety-critical systems if TensorFlow is embedded in such environments. However, since the vulnerability does not allow for code execution or data leakage, the confidentiality and integrity risks are minimal. The absence of known exploits reduces immediate risk, but the widespread use of TensorFlow in European research institutions, technology companies, and industrial applications means the vulnerability should be addressed promptly to avoid potential disruption. Additionally, organizations that expose machine learning inference or training services to external users or untrusted data sources are at higher risk.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify all TensorFlow deployments and verify the versions in use, focusing on versions prior to 2.8.4, between 2.9.0 and 2.9.3, and between 2.10.0 and 2.10.1. 2) Upgrade TensorFlow to version 2.11 or later, or apply the backported patches available for versions 2.8.4, 2.9.3, and 2.10.1 to ensure the vulnerability is remediated. 3) Review and restrict access to any interfaces or APIs that accept input data for TensorFlow processing, especially those exposed externally, to reduce the risk of malicious input triggering the vulnerability. 4) Implement input validation and sanitization at the application level to ensure that pooling sequences or similar inputs conform to expected sizes and formats before being passed to TensorFlow. 5) Monitor TensorFlow logs and application behavior for unexpected crashes or anomalies that could indicate attempted exploitation. 6) For critical systems, consider deploying runtime protections or sandboxing TensorFlow processes to limit the impact of crashes. 7) Engage with software vendors or internal development teams to ensure that machine learning pipelines are updated and tested against this vulnerability. These steps go beyond generic patching advice by emphasizing input validation, access control, and monitoring tailored to TensorFlow’s usage context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-30T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6d06

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 9:07:44 PM

Last updated: 7/27/2025, 12:32:52 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats