CVE-2025-71006

6.5 MEDIUM

📋 TL;DR

A floating point exception vulnerability in OneFlow's reshape component allows attackers to crash the application via specially crafted input, causing denial of service. This affects systems running OneFlow v0.9.0 for machine learning operations.

💻 Affected Systems

Products:
  • OneFlow
Versions: v0.9.0
Operating Systems: All platforms running OneFlow
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the oneflow.reshape component. The vulnerability is present in default configurations when this component is utilized.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption where the OneFlow process crashes and becomes unavailable, potentially affecting dependent machine learning pipelines and applications.

🟠

Likely Case

Application crash requiring restart, causing temporary service interruption and potential data loss for in-progress operations.

🟢

If Mitigated

Minimal impact with proper input validation and error handling in place to catch exceptions before they cause crashes.

🌐 Internet-Facing: MEDIUM - Attackers could exploit this if the OneFlow service is exposed to untrusted input sources, but requires specific knowledge of the vulnerable component.
🏢 Internal Only: LOW - Internal systems with controlled input sources and trusted users have lower risk, though malicious insiders could still trigger the issue.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific input to trigger the floating point exception, but no authentication is needed if the vulnerable component is accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub issue for specific fix version

Vendor Advisory: https://github.com/Oneflow-Inc/oneflow/issues/10653

Restart Required: Yes

Instructions:

1. Monitor the GitHub issue for official patch release. 2. Update OneFlow to the patched version when available. 3. Restart all OneFlow services after update.

🔧 Temporary Workarounds

Input Validation Wrapper

all

Implement input validation before passing data to oneflow.reshape to prevent malformed inputs from reaching the vulnerable component.

# Implement custom validation function for reshape inputs
# Example: validate tensor dimensions before reshape operations

Error Handling Enhancement

all

Add exception handling around reshape operations to catch floating point exceptions and prevent application crashes.

# Wrap reshape calls in try-catch blocks
# Example: try { result = oneflow.reshape(input) } catch (Exception e) { handle_error(e) }

🧯 If You Can't Patch

  • Implement network segmentation to isolate OneFlow services from untrusted networks
  • Deploy application-level firewalls or WAFs to filter and validate input to OneFlow endpoints

🔍 How to Verify

Check if Vulnerable:

Check if running OneFlow v0.9.0 and using oneflow.reshape operations in your codebase.

Check Version:

python -c "import oneflow; print(oneflow.__version__)"

Verify Fix Applied:

After updating, test reshape operations with various inputs to ensure no floating point exceptions occur.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with floating point exception errors
  • Segmentation fault or arithmetic exception in logs
  • Unexpected process termination of OneFlow services

Network Indicators:

  • Unusual input patterns to OneFlow reshape endpoints
  • Multiple failed requests followed by service unavailability

SIEM Query:

source="oneflow.logs" AND ("floating point" OR "divide by zero" OR "arithmetic exception" OR "segmentation fault")

🔗 References

📤 Share & Export