Vulnerability Description
Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in a stack overflow during execution as resolving each `NodeDef` means resolving the function itself and its nodes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tensorflow | <= 2.5.2 |
Related Weaknesses (CWE)
References
- https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca54PatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7PatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca54PatchThird Party Advisory
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7PatchThird Party Advisory
FAQ
What is CVE-2022-23591?
CVE-2022-23591 is a vulnerability with a CVSS score of 7.5 (HIGH). Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `...
How severe is CVE-2022-23591?
CVE-2022-23591 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23591?
Check the references section above for vendor advisories and patch information. Affected products include: Google Tensorflow.