
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an open source machine learning platform, was found to contain a vulnerability (CVE-2023-25674) in versions prior to 2.12.0 and 2.11.1. The vulnerability manifests as a null pointer error in the RandomShuffle operation when XLA (Accelerated Linear Algebra) is enabled (TF Advisory, NVD).
The vulnerability is characterized by a null pointer error that occurs specifically when using the RandomShuffle operation with XLA compilation enabled. The issue can be triggered when specific parameters are passed to the RandomShuffle operation, including extreme values such as seed parameters. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High), with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).
When exploited, this vulnerability can lead to application crashes due to the null pointer dereference, potentially causing denial of service in applications using TensorFlow's RandomShuffle operation with XLA enabled (TF Advisory).
The vulnerability has been patched in TensorFlow versions 2.12.0 and 2.11.1. Users are advised to upgrade to these or later versions to mitigate the issue. The fix was implemented in commit 728113a3be690facad6ce436660a0bc1858017fa (TF Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."