CVE-2022-35981
Python vulnerability analysis and mitigation

Overview

TensorFlow, an open source platform for machine learning, was found to have a vulnerability in its FractionalMaxPoolGrad function (CVE-2022-35981). The vulnerability was discovered where the function validates its inputs using CHECK failures instead of returning errors properly. This issue was reported by Neophytos Christou from Secure Systems Labs, Brown University, and was disclosed on September 15, 2022. The vulnerability affects TensorFlow versions prior to 2.10.0 (GitHub Advisory).

Technical details

The vulnerability exists in the FractionalMaxPoolGrad function's input validation mechanism. When the function receives incorrectly sized inputs, it triggers CHECK failures rather than properly handling the errors and returning appropriate error messages. The issue has been assigned a CVSS v3.1 base score of 7.5 HIGH by NIST NVD, while GitHub rates it as 5.9 MEDIUM. The vulnerability is tracked as CWE-617 (Reachable Assertion) (NVD).

Impact

If exploited, this vulnerability can be used to trigger a denial of service (DoS) attack. When incorrectly sized inputs are provided to the FractionalMaxPoolGrad function, the CHECK failure can cause the application to crash, potentially disrupting the service availability (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in TensorFlow version 2.10.0. The fix has also been backported to versions 2.7.2, 2.8.1, and 2.9.1. Users are advised to upgrade to these patched versions. The fix was implemented in GitHub commit 8741e57d163a079db05a7107a7609af70931def4, which changes the validation mechanism to return proper errors instead of CHECK failures. There are no known workarounds for this issue (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23949HIGH8.6
  • PythonPython
  • jaraco.context
NoYesJan 20, 2026
CVE-2026-22219HIGH8.3
  • PythonPython
  • chainlit
NoYesJan 20, 2026
CVE-2026-23842HIGH7.5
  • PythonPython
  • chatterbot
NoYesJan 19, 2026
CVE-2026-23877MEDIUM5.3
  • PythonPython
  • swingmusic
NoYesJan 19, 2026
CVE-2026-23833LOW1.7
  • PythonPython
  • esphome
NoYesJan 19, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management