{"id":"CVE-2022-23592","summary":"Out of bounds read in Tensorflow","details":"Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can cause a heap out of bounds read as the bounds checking is done in a `DCHECK` (which is a no-op during production). An attacker can control the `input_idx` variable such that `ix` would be larger than the number of values in `node_t.args`. The fix will be included in TensorFlow 2.8.0. This is the only affected version.","aliases":["BIT-tensorflow-2022-23592","GHSA-vq36-27g6-p492","PYSEC-2022-101","PYSEC-2022-156"],"modified":"2026-04-11T22:13:41.188513Z","published":"2022-02-04T22:32:14Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23592.json","cwe_ids":["CWE-125"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/23xxx/CVE-2022-23592.json"},{"type":"ADVISORY","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq36-27g6-p492"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23592"},{"type":"FIX","url":"https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tensorflow/tensorflow","events":[{"introduced":"c256c071bb26e1e13b4666d1b3e229e110bc914a"},{"fixed":"c99d98cd189839dcf51aee94e7437b54b31f8abd"}]}],"database_specific":{"vanir_signatures":[{"source":"https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd","signature_type":"Line","target":{"file":"tensorflow/core/graph/graph.cc"},"signature_version":"v1","id":"CVE-2022-23592-390d04c3","digest":{"line_hashes":["136651980621224309214062973178986216571","315342723120849409558061145063358964265","278934803457203388621311444072048361556","250291118351502504129999968134957631312","2264576344377463300726046103558255457","332267417778269824759097762631808357996","72481936810125389658479841137545332434"],"threshold":0.9},"deprecated":false},{"source":"https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd","signature_type":"Function","target":{"function":"Node::RunForwardTypeInference","file":"tensorflow/core/graph/graph.cc"},"signature_version":"v1","id":"CVE-2022-23592-65cb5a3a","digest":{"length":1581,"function_hash":"199817465963297102726003794640360933190"},"deprecated":false}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23592.json","vanir_signatures_modified":"2026-04-11T22:13:41Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"}]}