CVE-2021-29513
Python vulnerability analysis and mitigation

Overview

TensorFlow, an end-to-end open source platform for machine learning, was found to have a vulnerability (CVE-2021-29513) related to type confusion during tensor casts. The vulnerability was discovered when calling TensorFlow operations with tensors of non-numeric types when the operations expect numeric tensors, resulting in null pointer dereferences. The issue affects TensorFlow versions up to 2.1.4, 2.2.3, 2.3.3, and 2.4.2 (GitHub Advisory).

Technical details

The vulnerability stems from a type confusion in the conversion from Python array to C++ array. When processing certain tensor types, the pyarraytype is NPYVOID but the descr field has descr->field = NULL. This leads to a null pointer dereference in the PyArrayDescrtoTFDataType function when PyDictNext attempts to dereference the first argument. The vulnerability received a CVSS v3.1 base score of 7.8 (HIGH) from NVD, while GitHub assessed it with a score of 2.5 (LOW) (NVD).

Impact

When exploited, this vulnerability can result in null pointer dereferences, which could potentially lead to application crashes. The issue affects multiple versions of TensorFlow and could impact applications that process non-numeric tensor types with operations expecting numeric tensors (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in TensorFlow 2.5.0. The fix was also backported to TensorFlow versions 2.4.2, 2.3.3, 2.2.3, and 2.1.4. Users are advised to upgrade to these patched versions. The fix was implemented in GitHub commit 030af767d357d1b4088c4a25c72cb3906abac489 (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-66422MEDIUM4.3
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management