CVE-2021-29518
Python vulnerability analysis and mitigation

Overview

TensorFlow, an end-to-end open source platform for machine learning, was found to contain a vulnerability (CVE-2021-29518) discovered in May 2021. In eager mode (default in TensorFlow 2.0 and later), session operations are invalid, but users could still call the raw ops associated with them, potentially triggering a null pointer dereference. This vulnerability affects versions prior to 2.5.0 and was reported by members of the Aivul Team from Qihoo 360 (GitHub Advisory).

Technical details

The vulnerability stems from the implementation in the session operations code where it dereferences the session state pointer without validating if it is valid. Specifically, in eager mode, ctx->session_state() is nullptr, and calling the member function results in undefined behavior. The issue was found in the implementation at tensorflow/core/kernels/session_ops.cc (TensorFlow Commit). The vulnerability has been assigned a CVSS v3.1 base score of 7.8 HIGH by NVD, though GitHub's assessment rates it as LOW with a CVSS score of 2.5 (NVD).

Impact

When exploited, this vulnerability can lead to a null pointer dereference, potentially causing program crashes and denial of service conditions. The vulnerability can be triggered by calling raw ops such as tf.raw_ops.GetSessionTensor or tf.raw_ops.DeleteSessionTensor in eager mode (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in TensorFlow 2.5.0. Additionally, the fix has been backported to TensorFlow versions 2.4.2, 2.3.3, 2.2.3, and 2.1.4. Users are advised to upgrade to these patched versions. The fix involves adding proper validation of the session state pointer before dereferencing it (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67511CRITICAL9.6
  • PythonPython
  • cai-framework
NoNoDec 09, 2025
CVE-2025-66645HIGH7.5
  • PythonPython
  • nicegui
NoYesDec 09, 2025
GHSA-9rwj-6rc7-p77cHIGH7.3
  • PythonPython
  • langgraph-checkpoint-sqlite
NoYesDec 10, 2025
CVE-2025-67502MEDIUM5.4
  • PythonPython
  • taguette
NoYesDec 10, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management