
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an open source platform for machine learning, was found to contain a vulnerability (CVE-2023-25673) affecting versions prior to 2.12.0 and 2.11.1. The vulnerability involves a Floating Point Exception (FPE) in TensorListSplit when used with XLA (Accelerated Linear Algebra). This security issue was discovered by r3pwnx and was publicly disclosed on March 24, 2023 (GitHub Advisory).
The vulnerability occurs in the TensorListSplit operation when used with XLA enabled. The issue specifically manifests when the lengths parameter is set to zero, which triggers a floating point exception. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH), with a vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating it can be exploited remotely without requiring privileges or user interaction (NVD).
When successfully exploited, this vulnerability can cause a denial of service condition through a floating point exception, potentially causing the application to crash. This is particularly concerning for production environments where TensorFlow is deployed in machine learning applications or cloud services (GitHub Advisory).
The vulnerability has been patched in TensorFlow versions 2.12.0 and 2.11.1. The fix implements a check to ensure all lengths must be positive before processing the TensorListSplit operation. Users are advised to upgrade to either of these patched versions. The fix was implemented in commit 728113a3be690facad6ce436660a0bc1858017fa (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."