
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an end-to-end open source platform for machine learning, reported a vulnerability (CVE-2021-37680) in its implementation of fully connected layers in TFLite. The vulnerability was discovered and disclosed in August 2021, affecting TensorFlow versions prior to 2.6.0. The issue was concurrently reported by members of the Aivul Team from Qihoo 360 and Yakun Zhang of Baidu Security (GitHub Advisory).
The vulnerability stems from a division by zero error in the fully connected layers implementation within TFLite. Specifically, the issue occurs in the calculation const int batch_size = input_size / filter->dims->data[1], where there was no validation to ensure that filter->dims->data[1] is non-zero (GitHub Commit).
An attacker could potentially craft a malicious TensorFlow Lite model where the filter->dims->data[1] value is set to zero, triggering a division by zero error. This could lead to program crashes and potential denial of service conditions (GitHub Advisory).
The issue was patched in TensorFlow 2.6.0 and backported to versions 2.5.1, 2.4.3, and 2.3.4. The fix involves adding a validation check to ensure that filter->dims->data[1] is not zero before performing the division operation. Users are advised to upgrade to these patched versions (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."