
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow, an end-to-end open source platform for machine learning, was found to contain a vulnerability in the implementation of tf.raw_ops.ReverseSequence that could lead to stack overflow and denial of service conditions. The vulnerability, identified as CVE-2021-29575, was discovered by Ying Wang and Yakun Zhang of Baidu X-Team and disclosed on May 14, 2021. The issue affected multiple versions of TensorFlow prior to version 2.5.0 (GitHub Advisory).
The vulnerability stems from the implementation's failure to validate the seq_dim and batch_dim arguments in the ReverseSequence operation. Negative values for seq_dim could trigger stack overflow or CHECK-failure, depending on the version of Eigen code used. Similar issues could occur with invalid values of batch_dim. The vulnerability has been assigned a CVSS v3.1 score of 7.8 (HIGH) (NVD Results).
When exploited, this vulnerability could lead to stack overflow conditions or denial of service through CHECK-failure, potentially causing program termination. The impact varies depending on the specific version of the Eigen code implementation being used (GitHub Advisory).
The vulnerability was patched in GitHub commit ecf768cbe50cedc0a45ce1ee223146a3d3d26d23 and included in TensorFlow 2.5.0. The fix was also backported to versions 2.4.2, 2.3.3, 2.2.3, and 2.1.4. Users are advised to upgrade to these patched versions to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."