
Cloud Vulnerability DB
A community-led vulnerabilities database
TensorFlow's implementation of tf.raw_ops.FractionalMaxPoolGrad contained a vulnerability (CVE-2021-29580) that was discovered in May 2021. The vulnerability affected TensorFlow versions prior to 2.5.0, where the implementation failed to validate that input and output tensors are not empty and are of the same rank (GitHub Advisory).
The vulnerability manifests in two ways: First, it triggers undefined behavior if one of the input tensors is empty. Second, it can lead to a denial of service attack through a CHECK condition failure that aborts the process. The issue specifically occurs in the FractionalMaxPoolGrad operation when input validation is insufficient for tensor ranks and empty tensor checks (GitHub Advisory).
The vulnerability can result in undefined behavior and potential denial of service attacks. When exploited, it could cause the application to crash through CHECK condition failures, disrupting the normal operation of TensorFlow-based applications (GitHub Advisory).
The issue was patched in TensorFlow 2.5.0. The fix was also backported to versions 2.4.2, 2.3.3, 2.2.3, and 2.1.4. Users should upgrade to these patched versions to mitigate the vulnerability. The fix includes proper validation of input and output tensors to ensure they are not empty and have the correct rank (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."