
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability was discovered in TensorFlow's PNG image decoding functionality (CVE-2022-23584). The vulnerability affects TensorFlow versions prior to 2.8.0, where after png::CommonFreeDecode(&decode) is called, the values of decode.width and decode.height are left in an unspecified state, potentially leading to memory corruption (GitHub Advisory).
The vulnerability occurs in the PNG decoding kernel of TensorFlow when processing PNG images. After calling png::CommonFreeDecode(&decode), the code continues to use decode.width and decode.height values in an error message, even though these values are in an undefined state after the memory has been freed (GitHub Commit). The vulnerability has been assigned a CVSS v3.1 base score of 6.5 MEDIUM by NVD and 7.6 HIGH by GitHub (NVD).
A malicious user can potentially exploit this vulnerability by crafting specific PNG images that trigger the use-after-free condition. This could lead to memory corruption and potential security implications in applications using TensorFlow's image decoding functionality (GitHub Advisory).
The vulnerability has been patched in TensorFlow 2.8.0. Additionally, the fix has been backported to TensorFlow 2.7.1, 2.6.3, and 2.5.3. Users are advised to upgrade to these patched versions. The fix involves removing the premature memory cleanup call before the error condition check (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."