Vulnerability Name: CVE-2022-23595 (CCN-218893) Assigned: 2022-02-02 Published: 2022-02-02 Updated: 2022-02-10 Summary: Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are used, TensorFlow triggers a null pointer dereference. In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. CVSS v3 Severity: 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H )5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H )4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
4.9 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-476 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2022-23595 Source: XF Type: UNKNOWNtensorflow-cve202223595-dos(218893) Source: MISC Type: Exploit, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104 Source: MISC Type: Patch, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8 Source: CCN Type: TensorFlow GIT RepositoryNull pointer dereference in BuildXlaCompilationCache (XLA) Source: CONFIRM Type: Patch, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx Source: CCN Type: IBM Security Bulletin 6564605 (Watson Discovery)IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in TensorFlow Source: CCN Type: TensorFlow Web siteTensorFlow Vulnerable Configuration: Configuration 1 :cpe:/a:google:tensorflow:*:*:*:*:*:*:*:* (Version <= 2.5.2)OR cpe:/a:google:tensorflow:*:*:*:*:*:*:*:* (Version >= 2.6.0 and <= 2.6.2) OR cpe:/a:google:tensorflow:2.7.0:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:google:tensorflow:1.3.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.3.1:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.4.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.4.1:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.5.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.5.1:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.6.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.1.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.2.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.2.1:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.0.1:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.0.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.12.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.0.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:1.15.3:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.0.2:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.1.1:*:*:*:-:*:*:* OR cpe:/a:tensorflow:tensorflow:2.2.0:*:*:*:-:*:*:* OR cpe:/a:tensorflow:tensorflow:2.3.0:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.1.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.4.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.1.4:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.2.3:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.3.3:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.4.2:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.5.0:-:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.6.0:-:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.5.2:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.6.2:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.7.0:*:*:*:*:*:*:* AND cpe:/a:ibm:watson_discovery:2.0.0:*:*:*:*:*:*:* OR cpe:/a:ibm:watson_discovery:2.2.1:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
google tensorflow *
google tensorflow *
google tensorflow 2.7.0
google tensorflow 1.3.0 -
google tensorflow 1.3.1
google tensorflow 1.4.0 -
google tensorflow 1.4.1
google tensorflow 1.5.0 -
google tensorflow 1.5.1
google tensorflow 1.6.0 -
google tensorflow 1.1.0 -
google tensorflow 1.2.0 -
google tensorflow 1.2.1
google tensorflow 1.0.1
google tensorflow 1.0.0 -
google tensorflow 1.12.0 -
google tensorflow 2.0.0 -
google tensorflow 1.15.3
google tensorflow 2.0.2
google tensorflow 2.1.1
tensorflow tensorflow 2.2.0
tensorflow tensorflow 2.3.0
google tensorflow 2.1.0 -
google tensorflow 2.4.0 -
google tensorflow 2.1.4
google tensorflow 2.2.3
google tensorflow 2.3.3
google tensorflow 2.4.2
google tensorflow 2.5.0 -
google tensorflow 2.6.0 -
google tensorflow 2.5.2
google tensorflow 2.6.2
google tensorflow 2.7.0
ibm watson discovery 2.0.0
ibm watson discovery 2.2.1