CVE-2022-36016
Python vulnerability analysis and mitigation

Overview

TensorFlow, an open source platform for machine learning, was found to have a vulnerability (CVE-2022-36016) where the tensorflow::full_type::SubstituteFromAttrs function triggers a CHECK-fail instead of returning a status when receiving a FullTypeDef& t that does not contain exactly three arguments. The vulnerability was discovered and disclosed in July 2022, affecting TensorFlow versions prior to 2.10.0 (GitHub Advisory).

Technical details

The vulnerability exists in the input validation mechanism of the SubstituteFromAttrs function. When the function receives a FullTypeDef& t parameter with anything other than exactly three arguments, it triggers a CHECK-fail condition instead of properly handling the error by returning a status. This issue was addressed by replacing the DCHECK statement with explicit test and status return functionality (TensorFlow Commit).

Impact

The vulnerability has been classified as Low severity. When triggered, it causes a CHECK-fail condition in the TensorFlow framework, which could potentially lead to application instability or crashes when processing certain input configurations (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in multiple TensorFlow versions: 2.10.0, 2.9.1, 2.8.1, and 2.7.2. Users are advised to upgrade to these patched versions. The fix was implemented through GitHub commit 6104f0d4091c260ce9352f9155f7e9b725eab012. There are no known workarounds for this issue other than upgrading to a patched version (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22612HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22609HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22608HIGH8.9
  • PythonPython
  • fickling
NoYesJan 10, 2026
CVE-2026-22691LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026
CVE-2026-22690LOW2.7
  • PythonPython
  • pypdf
NoYesJan 10, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management