
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an end-to-end open source platform for machine learning, was found to contain a vulnerability (CVE-2021-29574) in the implementation of tf.raw_ops.MaxPool3DGradGrad. The vulnerability was discovered by Ying Wang and Yakun Zhang of Baidu X-Team and disclosed on May 14, 2021. The issue affects TensorFlow versions prior to 2.5.0, including versions 2.1.x, 2.2.x, 2.3.x, and 2.4.x (GitHub Advisory).
The vulnerability stems from the implementation's failure to validate tensor inputs, which can lead to undefined behavior through null pointer dereferencing. When an attacker supplies empty tensors as inputs, accessing elements in these tensors results in dereferencing null pointers. The issue received a CVSS v3.1 score of 7.8 HIGH (NVD).
When exploited, this vulnerability can lead to undefined behavior in the application through null pointer dereferencing. This could potentially result in application crashes or denial of service conditions when processing specially crafted inputs (GitHub Advisory).
The issue was patched in GitHub commit a3d9f9be9ac2296615644061b40cefcee341dcc4 and included in TensorFlow 2.5.0. The fix was also backported to TensorFlow 2.4.2, 2.3.3, 2.2.3, and 2.1.4. Users are advised to upgrade to these patched versions to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."