Miggo Logo

CVE-2022-23584: Use after free in `DecodePng` kernel

7.6

CVSS Score
3.1

Basic Information

EPSS Score
0.47005%
Published
2/9/2022
Updated
11/7/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
tensorflowpip< 2.5.32.5.3
tensorflowpip>= 2.6.0, < 2.6.32.6.3
tensorflowpip= 2.7.02.7.1
tensorflow-cpupip< 2.5.32.5.3
tensorflow-cpupip>= 2.6.0, < 2.6.32.6.3
tensorflow-cpupip= 2.7.02.7.1
tensorflow-gpupip< 2.5.32.5.3
tensorflow-gpupip>= 2.6.0, < 2.6.32.6.3
tensorflow-gpupip= 2.7.02.7.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs in the PNG decoding path where error handling frees the decode structure with png::CommonFreeDecode but then attempts to read its width/height fields for error reporting. The commit e746adbfcfee15e9cfdb391ff746c765b99bdf9b fixes this by removing the premature free call before accessing these fields. The code location is explicitly referenced in the advisory and matches the described use-after-free pattern.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * m*li*ious us*r **n **us* * us* **t*r *r** ****vior w**n [***o*in* PN* im***s](*ttps://*it*u*.*om/t*nsor*low/t*nsor*low/*lo*/****************************************/t*nsor*low/*or*/k*rn*ls/im***/***o**_im***_op.**#L***-L***): ```** i* (/

Reasoning

T** vuln*r**ility o**urs in t** PN* ***o*in* p*t* w**r* *rror **n*lin* *r**s t** ***o** stru*tur* wit* `pn*::*ommon*r*****o**` *ut t**n *tt*mpts to r*** its wi*t*/**i**t *i*l*s *or *rror r*portin*. T** *ommit `****************************************