Vulnerability Name: CVE-2022-29212 (CCN-227111) Assigned: 2022-05-17 Published: 2022-05-17 Updated: 2022-06-03 Summary: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, certain TFLite models that were created using TFLite model converter would crash when loaded in the TFLite interpreter. The culprit is that during quantization the scale of values could be greater than 1 but code was always assuming sub-unit scaling. Thus, since code was calling `QuantizeMultiplierSmallerThanOneExp`, the `TFLITE_CHECK_LT` assertion would trigger and abort the process. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue. CVSS v3 Severity: 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H )4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H )4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): LowUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-20 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2022-29212 Source: XF Type: UNKNOWNtensorflow-cve202229212-dos(227111) Source: MISC Type: Third Party Advisoryhttps://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/lite/kernels/internal/quantization_util.cc#L114-L123 Source: MISC Type: Patch, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/commit/a989426ee1346693cc015792f11d715f6944f2b8 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/issues/43661 Source: MISC Type: Release Notes, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/releases/tag/v2.6.4 Source: MISC Type: Release Notes, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/releases/tag/v2.7.2 Source: MISC Type: Release Notes, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/releases/tag/v2.8.1 Source: MISC Type: Release Notes, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/releases/tag/v2.9.0 Source: CCN Type: TensorFlow GIT RepositoryCore dump when loading TFLite models with quantization Source: CONFIRM Type: Exploit, Patch, Third Party Advisoryhttps://github.com/tensorflow/tensorflow/security/advisories/GHSA-8wwm-6264-x792 Source: CCN Type: IBM Security Bulletin 6598705 (Watson Discovery)IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in TensorFlow Source: CCN Type: IBM Security Bulletin 6988959 (Maximo Application Suite)Tensorflow is vulnerable to security CVEs used in IBM Maximo Application Suite - Monitor Component Source: CCN Type: Mend Vulnerability DatabaseCVE-2022-29212 Source: CCN Type: TensorFlow Web siteTensorFlow Vulnerable Configuration: Configuration 1 :cpe:/a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:* OR cpe:/a:google:tensorflow:*:*:*:*:*:*:*:* (Version >= 2.7.0 and < 2.7.2) OR cpe:/a:google:tensorflow:*:*:*:*:*:*:*:* (Version < 2.6.4) OR cpe:/a:google:tensorflow:2.8.0:rc0:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.8.0:rc1:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.9.0:rc1:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.9.0:rc0:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.8.0:-:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:google:tensorflow:1.15.3:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.0.2:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.1.1:*:*:*:-:*:*:* OR cpe:/a:tensorflow:tensorflow:2.2.0:*:*:*:-:*:*:* OR cpe:/a:tensorflow:tensorflow:2.3.0:*:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.1.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.4.0:-:*:*:-:*:*:* OR cpe:/a:google:tensorflow:2.1.4:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.2.3:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.3.3:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.4.2:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.5.0:-:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.6.0:-:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.5.2:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.6.2:*:*:*:*:*:*:* OR cpe:/a:google:tensorflow:2.7.0:-:*:*:*:*:*:* AND cpe:/a:ibm:maximo_application_suite:8.8:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
google tensorflow 2.7.0 rc1
google tensorflow 2.7.0 rc0
google tensorflow *
google tensorflow *
google tensorflow 2.8.0 rc0
google tensorflow 2.8.0 rc1
google tensorflow 2.9.0 rc1
google tensorflow 2.9.0 rc0
google tensorflow 2.8.0 -
google tensorflow 1.15.3
google tensorflow 2.0.2
google tensorflow 2.1.1
tensorflow tensorflow 2.2.0
tensorflow tensorflow 2.3.0
google tensorflow 2.1.0 -
google tensorflow 2.4.0 -
google tensorflow 2.1.4
google tensorflow 2.2.3
google tensorflow 2.3.3
google tensorflow 2.4.2
google tensorflow 2.5.0 -
google tensorflow 2.6.0 -
google tensorflow 2.5.2
google tensorflow 2.6.2
google tensorflow 2.7.0 -
ibm maximo application suite 8.8