IBM Support

Security Bulletin: IBM Watson Discovery for IBM Cloud Pak for Data affected by vulnerability in TensorFlow

Security Bulletin


Summary

IBM Watson Discovery for IBM Cloud Pak for Data contains a vulnerable version of TensorFlow.

Vulnerability Details

CVEID:   CVE-2022-35959
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by improper validation of user-supplied input by the implementation of AvgPool3DGradOp. By sending specially-crafted request using the orig_input_shape parameter, a remote attacker could exploit this vulnerability to cause an overflow, resulting in a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236443 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35966
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault. By giving min_input or max_input tensors of a nonzero rank in QuantizedAvgPool, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236469 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35994
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying nonscalar input to CollectiveGather, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236486 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36026
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK fail when giving QuantizeAndDequantizeV3 a nonscalar num_bits input tensor. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236430 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35939
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by an out-of-bounds write in the ScatterNd function. By sending a specially-crafted request using an input index greater than the output tensor or less than zero, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236447 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)

CVEID:   CVE-2022-35986
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault. By supplying an empty splits tensor to RaggedBincount, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236473 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35990
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By giving min or max rank other than 1 in tf.quantization.fake_quant_with_min_max_vars_per_channel_gradient, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236490 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36002
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying Unbatch with nonscalar input using the id parameter, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236434 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35934
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK-failure in the implementation of tf.reshape op. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to overflow the number of elements in a tensor, resulting in a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236451 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35982
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault. By supplying specially-crafted input using the indices, values and dense_shape paramters to SparseBincount, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236477 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36015
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by an integer overflow when RangeSize receives values that do not fit into an int64_t. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236494 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35998
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying EmptyTensorList with an element_shape input with more than one dimension, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236438 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35970
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault. By giving x_min or x_max tensors of a nonzero rank in QuantizedInstanceNorm, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236465 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35973
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault. By supplying nonscalar input using the min_a, max_a, min_b, or max_b parameters to QuantizedMatMul, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236481 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35997
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying tf.sparse.cross with nonscalar input using the separator parameter, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236439 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35969
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure in the implementation of Conv2DBackpropInput. By sending a specially-crafted request using non-4-dimensional input in the input_sizes parameter, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236466 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36016
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK fail when tensorflow::full_type::SubstituteFromAttrs receives a FullTypeDef& t that is not exactly three args. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236483 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35952
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure in the UnbatchGradOp function. By sending a specially-crafted request using nonscalar input in the id parameter, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236444 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35965
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a NULL pointer dereference. By giving LowerBound or UpperBound an empty sorted_inputs input, a remote attacker could exploit this vulnerability to cause segmentation fault, resulting in a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236470 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35993
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying set_shape input that is not a 1D tensor to SetSize, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236487 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36005
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying tf.quantization.fake_quant_with_min_max_vars_gradient with nonscalar input, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236431 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35938
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by an out-of-bounds read in the GatherNd function. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236448 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)

CVEID:   CVE-2022-35985
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying an output_image input tensor that is not 4-D to LRNGrad, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236474 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35989
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure in the GPU kernel. By supplying the ksize window size input array with dimensions greater than the MaxPool tensor input to MaxPool, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236491 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36001
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure in DrawBoundingBoxes. By supplying boxes with a non-float dtype, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236435 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36018
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK fail when RaggedTensorToVariant is given an rt_nested_splits list that contains tensors of ranks other than one. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236453 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35981
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying incorrectly sized inputs to FractionalMaxPoolGrad, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236478 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36014
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a NULL pointer dereference in mlir::tfg::TFOp::nameAttr. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236495 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36000
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a NULL pointer dereference. By supplying mlir::tfg::ConvertGenericFunctionToFunctionDef with empty function attributes, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236436 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36017
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault when Requantize is given input_min, input_max, requested_output_min, and requested_output_max tensors of a non-zero rank. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236454 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35979
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault. By supplying nonscalar input using the min_features or max_features parameters to QuantizedRelu or QuantizedRelu6, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236479 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36013
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a NULL pointer dereference in mlir::tfg::GraphDefImporter::ConvertNodeDef. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236496 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36019
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK fail when FakeQuantWithMinMaxVarsPerChannel is given min or max tensors of a rank other than one. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236440 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35968
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by improper validation of user-supplied input by the implementation of AvgPoolGrad. By sending a specially-crafted request using orig_input_shape parameter, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236467 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35996
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a division-by-zero floating point exception. By supplying empty values in the input, filter and padding sizes to Conv2D, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236484 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36011
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a NULL pointer dereference. By supplying mlir::tfg::ConvertGenericFunctionToFunctionDef with empty function attributes, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236428 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35941
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by improper validation of user-supplied input by the AvgPoolOp function. By sending a specially-crafted request using a negative ksize arument, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236445 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35964
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by improper validation of user-supplied input by the implementation of BlockLSTMGradV2. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a segmentation fault, resulting in a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236471 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35992
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying an element_shape of a rank greater than one to TensorListFromTensor, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236488 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36004
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying tf.random.gamma with large input shape and rates, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236432 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35937
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by an out-of-bounds read in the GatherNd function. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236449 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)

CVEID:   CVE-2022-35984
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying an int64 shape to ParameterizedTruncatedNormal, a remote attacker could exploit this vulnerability to cause mismatched type, resulting in a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236475 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35988
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure in the GPU kernel. By supplying empty input in the a parameter to tf.linalg.matrix_rank, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236492 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36003
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying RandomPoissonV2 with large input shape and rates, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236433 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35935
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure in the implementation of SobolSampleOp. By supplying nonscalar input in the input(0), input(1), and input(2) parameters, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236450 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35983
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying Save or SaveSlices with an unsupported dtype, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236476 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35987
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure in the UnbatchGradOp function. By supplying DenseBincount with a different weights shape than the input tensor, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236493 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35999
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying Conv2DBackpropInput with empty out_backprop inputs, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236437 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35971
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By giving min or max tensors of a nonzero rank in FakeQuantWithMinMaxVars, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236464 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35974
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault. By supplying nonscalar input using the input_min or input_max parameters to QuantizeDownAndShrinkRange, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236480 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36012
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by an assertion failure in mlir::tfg::ConvertGenericFunctionToFunctionDef. A remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236497 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35960
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by the assumption that num_elements has a tensor of size 1 in core/kernels/list_kernels.cc's TensorListReserve. By providing a num_elements with more than 1 element, a remote attacker could exploit this vulnerability to cause tf.raw_ops.TensorListReserve to fail the CHECK_EQ in CheckIsAlignedAndSingleElement, resulting in a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236442 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35967
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault. By giving min_input or max_input tensors of a nonzero rank in QuantizedAdd, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236468 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35995
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying a sample_rate input with more than one element to AudioSummaryV2, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236485 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-36027
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a segmentation fault when converting transposed convolutions using per-channel weight quantization. A remote attacker could exploit this vulnerability to cause the Python engine to crash.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236429 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35940
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by an overflow in the RaggedRangOp function when converting a TensorShape to a int64. By sending a specially-crafted request using a very large float in the limits parameter, a remote attacker could exploit this vulnerability to trigger an InvalidArgument error, resulting in a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236446 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35963
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by improper validation of user-supplied input by the implementation of FractionalAvgPoolGrad. By sending a specially-crafted request using orig_input_tensor_shape parameter, a remote attacker could exploit this vulnerability to cause an overflow, resulting in a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236472 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2022-35991
DESCRIPTION:   TensorFlow is vulnerable to a denial of service, caused by a CHECK failure. By supplying an element_shape of rank greater than one to TensorListScatter or TensorListScatterV2, a remote attacker could exploit this vulnerability to cause a denial of service.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/236489 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s)Version(s)
Watson Discovery4.0.0-4.5.3

Remediation/Fixes

Upgrade to IBM Watson Discovery 4.6.0

https://cloud.ibm.com/docs/discovery-data?topic=discovery-data-install

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

10 Nov 2022: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. "Affected Products and Versions" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.

Document Location

Worldwide

[{"Business Unit":{"code":"BU053","label":"Cloud \u0026 Data Platform"},"Product":{"code":"SSCLA6","label":"Watson Discovery"},"Component":"","Platform":[{"code":"PF040","label":"RedHat OpenShift"}],"Version":"4.0.0-4.5.3","Edition":""}]

Document Information

Modified date:
30 November 2022

UID

ibm16840935