
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an end-to-end open source platform for machine learning, was found to contain a vulnerability (CVE-2021-37653) where an attacker could trigger a crash via a floating point exception in tf.raw_ops.ResourceGather. The vulnerability was discovered and disclosed in August 2021, affecting TensorFlow versions prior to 2.6.0 (GitHub Advisory).
The vulnerability exists in the implementation of ResourceGather operation where the code computes a value called batch_size and then performs division using this value without first verifying that it is not zero. This can lead to a floating point exception and subsequent crash. The vulnerability can be triggered by passing specific parameters to the tf.raw_ops.ResourceGather function (GitHub Advisory).
When successfully exploited, this vulnerability results in a crash of the application through a floating point exception. This could lead to denial of service in systems using the affected TensorFlow versions (GitHub Advisory).
The vulnerability has been patched in TensorFlow versions 2.3.4, 2.4.3, 2.5.1, and 2.6.0. Users are advised to upgrade to these patched versions. The fix involves adding a check for zero value before performing the division operation, as implemented in commit ac117ee8a8ea57b73d34665cdf00ef3303bc0b11 (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."