Home » Database

AVID-2026-R0826

Description

Floating point exception in SparseDenseCwiseDiv in TensorFlow (CVE-2021-37636)

Details

TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of tf.raw_ops.SparseDenseCwiseDiv is vulnerable to a division by 0 error. The implementation uses a common class for all binary operations but fails to treat the division by 0 case separately. We have patched the issue in GitHub commit d9204be9f49520cdaaeb2541d1dc5187b23f31d9. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

Reason for inclusion in AVID: CVE-2021-37636 describes a division-by-zero vulnerability in TensorFlow’s SparseDenseCwiseDiv, a core AI framework component. TensorFlow is a widely used dependency in ML pipelines for training, serving, and deploying AI systems, so this is a software supply chain issue affecting AI software stacks. The report includes the vulnerability description, affected versions, the fix/commit, and references, satisfying evidence requirements. Its CVSS indicates a security impact (availability loss) with a local attack vector.

References

Affected or Relevant Artifacts

  • Developer: tensorflow
  • Deployer: tensorflow
  • Artifact Details:
TypeName
Systemtensorflow

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score5.5
Base Severity🟠 Medium
Attack VectorLOCAL
Attack Complexity🟢 Low
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity ImpactNONE
Availability Impact🔴 High

CWE

IDDescription
CWE-369CWE-369: Divide By Zero

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2021-08-12
  • Version: 0.3.3
  • AVID Entry