Vulnerability Name: CVE-2022-29207 (CCN-227128) Assigned: 2022-05-17 Published: 2022-05-17 Updated: 2022-06-02 Summary: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue. CVSS v3 Severity: 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H )4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:R )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H )4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:R )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-20 CWE-475 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2022-29207 Source: XF Type: UNKNOWNtensorflow-cve202229207-dos(227128) Source: MISC Type: Patch, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7 Source: MISC Type: Patch, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/commit/dbdd98c37bc25249e8f288bd30d01e118a7b4498 Source: MISC Type: Release Notes, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/releases/tag/v2.6.4 Source: MISC Type: Release Notes, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/releases/tag/v2.7.2 Source: MISC Type: Release Notes, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/releases/tag/v2.8.1 Source: MISC Type: Release Notes, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/releases/tag/v2.9.0 Source: CCN Type: TensorFlow GIT RepositoryUndefined behavior when users supply invalid resource handles Source: CONFIRM Type: Exploit, Patch, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/security/advisories/GHSA-5wpj-c6f7-24x8 Source: CCN Type: IBM Security Bulletin 6598705 (Watson Discovery)IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in TensorFlow Source: CCN Type: IBM Security Bulletin 6988959 (Maximo Application Suite)Tensorflow is vulnerable to security CVEs used in IBM Maximo Application Suite - Monitor Component Source: CCN Type: TensorFlow Web siteTensorFlow Vulnerable Configuration: Configuration 1 :cpe:/a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:* OR cpe:/a:google:tensorflow:*:*:*:*:*:*:*:* (Version >= 2.7.0 and < 2.7.2) OR cpe:/a:google:tensorflow:*:*:*:*:*:*:*:* (Version < 2.6.4) OR cpe:/a:google:tensorflow:2.8.0:rc0:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.8.0:rc1:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.9.0:rc1:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.9.0:rc0:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.8.0:-:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:google:tensorflow:1.15.3:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.0.2:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.1.1:*:*:*:-:*:*:* OR cpe:/a:tensorflow:tensorflow:2.2.0:*:*:*:-:*:*:* OR cpe:/a:tensorflow:tensorflow:2.3.0:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.1.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.4.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.1.4:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.2.3:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.3.3:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.4.2:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.5.0:-:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.6.0:-:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.5.2:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.6.2:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.7.0:-:*:*:*:*:*:* AND cpe:/a:ibm:maximo_application_suite:8.8:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
google tensorflow 2.7.0 rc1
google tensorflow 2.7.0 rc0
google tensorflow *
google tensorflow *
google tensorflow 2.8.0 rc0
google tensorflow 2.8.0 rc1
google tensorflow 2.9.0 rc1
google tensorflow 2.9.0 rc0
google tensorflow 2.8.0 -
google tensorflow 1.15.3
google tensorflow 2.0.2
google tensorflow 2.1.1
tensorflow tensorflow 2.2.0
tensorflow tensorflow 2.3.0
google tensorflow 2.1.0 -
google tensorflow 2.4.0 -
google tensorflow 2.1.4
google tensorflow 2.2.3
google tensorflow 2.3.3
google tensorflow 2.4.2
google tensorflow 2.5.0 -
google tensorflow 2.6.0 -
google tensorflow 2.5.2
google tensorflow 2.6.2
google tensorflow 2.7.0 -
ibm maximo application suite 8.8