Vulnerability Details : CVE-2022-23584
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use after free behavior when decoding PNG images. After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Vulnerability category: Memory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2022-23584
Probability of exploitation activity in the next 30 days: 0.12%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 46 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-23584
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
7.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H |
2.8
|
4.7
|
GitHub, Inc. |
CWE ids for CVE-2022-23584
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-23584
-
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg
Use after free in `DecodePng` kernel · Advisory · tensorflow/tensorflow · GitHubPatch;Third Party Advisory
-
https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b
Prevent use after free in `DecodePng` kernel. · tensorflow/tensorflow@e746adb · GitHubPatch;Third Party Advisory
-
https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346
tensorflow/decode_image_op.cc at a1320ec1eac186da1d03f033109191f715b2b130 · tensorflow/tensorflow · GitHubExploit;Third Party Advisory
Products affected by CVE-2022-23584
- cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*
- cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*