{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2022-23585","title":"Title"},{"category":"description","text":"Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However, several error case in the function implementation invoke the `OP_REQUIRES` macro which immediately terminates the execution of the function, without allowing for the memory free to occur. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2022-23585","url":"https://www.suse.com/security/cve/CVE-2022-23585"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1195545 for CVE-2022-23585","url":"https://bugzilla.suse.com/1195545"}],"title":"SUSE CVE CVE-2022-23585","tracking":{"current_release_date":"2025-03-15T07:43:46Z","generator":{"date":"2023-02-15T03:28:07Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2022-23585","initial_release_date":"2023-02-15T03:28:07Z","revision_history":[{"date":"2023-02-15T03:28:07Z","number":"2","summary":"Current version"},{"date":"2025-01-01T03:13:23Z","number":"3","summary":"Current version"},{"date":"2025-02-14T07:57:18Z","number":"4","summary":"Current version"},{"date":"2025-02-16T07:39:03Z","number":"5","summary":"Current version"},{"date":"2025-03-15T07:43:46Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"tensorflow-lite-2.9.1-1.1","product":{"name":"tensorflow-lite-2.9.1-1.1","product_id":"tensorflow-lite-2.9.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/tensorflow-lite@2.9.1-1.1"}}},{"category":"product_version","name":"tensorflow-lite-devel-2.9.1-1.1","product":{"name":"tensorflow-lite-devel-2.9.1-1.1","product_id":"tensorflow-lite-devel-2.9.1-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/tensorflow-lite-devel@2.9.1-1.1"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"tensorflow-lite-2.9.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tensorflow-lite-2.9.1-1.1"},"product_reference":"tensorflow-lite-2.9.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"tensorflow-lite-devel-2.9.1-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:tensorflow-lite-devel-2.9.1-1.1"},"product_reference":"tensorflow-lite-devel-2.9.1-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2022-23585","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-23585"}],"notes":[{"category":"general","text":"Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value contains allocated buffers which can only be freed by calling `png::CommonFreeDecode(&decode)`. However, several error case in the function implementation invoke the `OP_REQUIRES` macro which immediately terminates the execution of the function, without allowing for the memory free to occur. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:tensorflow-lite-2.9.1-1.1","openSUSE Tumbleweed:tensorflow-lite-devel-2.9.1-1.1"]},"references":[{"category":"external","summary":"CVE-2022-23585","url":"https://www.suse.com/security/cve/CVE-2022-23585"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1195545 for CVE-2022-23585","url":"https://bugzilla.suse.com/1195545"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:tensorflow-lite-2.9.1-1.1","openSUSE Tumbleweed:tensorflow-lite-devel-2.9.1-1.1"]}],"scores":[{"cvss_v3":{"baseScore":6.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:tensorflow-lite-2.9.1-1.1","openSUSE Tumbleweed:tensorflow-lite-devel-2.9.1-1.1"]}],"threats":[{"category":"impact","date":"2022-02-04T09:30:25Z","details":"critical"}],"title":"CVE-2022-23585"}]}