CVE-2022-23584: Use after free in `DecodePng` kernel
7.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.47005%
CWE
Published
2/9/2022
Updated
11/7/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
tensorflow | pip | < 2.5.3 | 2.5.3 |
tensorflow | pip | >= 2.6.0, < 2.6.3 | 2.6.3 |
tensorflow | pip | = 2.7.0 | 2.7.1 |
tensorflow-cpu | pip | < 2.5.3 | 2.5.3 |
tensorflow-cpu | pip | >= 2.6.0, < 2.6.3 | 2.6.3 |
tensorflow-cpu | pip | = 2.7.0 | 2.7.1 |
tensorflow-gpu | pip | < 2.5.3 | 2.5.3 |
tensorflow-gpu | pip | >= 2.6.0, < 2.6.3 | 2.6.3 |
tensorflow-gpu | pip | = 2.7.0 | 2.7.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in the PNG decoding path where error handling frees the decode structure with png::CommonFreeDecode
but then attempts to read its width/height fields for error reporting. The commit e746adbfcfee15e9cfdb391ff746c765b99bdf9b
fixes this by removing the premature free call before accessing these fields. The code location is explicitly referenced in the advisory and matches the described use-after-free pattern.