CVE-2021-29591
Python vulnerability analysis and mitigation

Overview

TensorFlow is an end-to-end open source platform for machine learning where a vulnerability (CVE-2021-29591) was discovered in TFLite graphs. The vulnerability was identified in versions prior to 2.5.0, affecting TensorFlow versions 2.1.4, 2.2.3, 2.3.3, and 2.4.2. The issue was reported by members of the Aivul Team from Qihoo 360 and was patched in May 2021 (GitHub Security).

Technical details

The vulnerability stems from missing validation checks in TFLite graphs that should prevent loops between nodes. In the specific case of the 'While' operator implementation, the vulnerability could be exploited when both the body and loop subgraphs are identical, causing recursive calls to the Eval function. This implementation flaw allowed attackers to craft models that would result in infinite loops during evaluation, which in certain cases would manifest as stack overflow due to excessive recursive calls (GitHub Security).

Impact

The vulnerability could lead to stack overflow conditions due to unbounded recursive calls, potentially causing denial of service through application crashes. In scenarios where both body and loop subgraphs are identical, the evaluation process would quickly exhaust all available stack space (GitHub Security).

Mitigation and workarounds

The vulnerability was patched through two GitHub commits: 9c1dc920d8 (specifically for the While operator) and c6173f5fe6 (for general cases). The fix was included in TensorFlow 2.5.0 and was backported to versions 2.4.2, 2.3.3, 2.2.3, and 2.1.4. Users are advised to upgrade to these patched versions to mitigate the vulnerability (GitHub Security).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66423HIGH7.1
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-66454MEDIUM6.5
  • PythonPython
  • arcade-mcp-server
NoYesDec 02, 2025
CVE-2025-66424MEDIUM6.5
  • PythonPython
  • trytond
NoYesNov 30, 2025
CVE-2025-66422MEDIUM4.3
  • PythonPython
  • tryton-server
NoYesNov 30, 2025
CVE-2025-65858LOW3.5
  • PythonPython
  • calibreweb
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management