Home » Database

AVID-2026-R0810

Description

Segfault in tf.raw_ops.SparseCountSparseOutput (CVE-2021-29619)

Details

TensorFlow is an end-to-end open source platform for machine learning. Passing invalid arguments (e.g., discovered via fuzzing) to tf.raw_ops.SparseCountSparseOutput results in segfault. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.

Reason for inclusion in AVID: The CVE describes a vulnerability in TensorFlow (an AI/ML framework) where invalid arguments to a core operation (tf.raw_ops.SparseCountSparseOutput) can cause a segfault. This directly affects software used to build/train/deploy AI systems, i.e., the AI software stack and its dependencies. It is a security vulnerability (CWE-755) with a published advisory and a patch in TensorFlow versions, indicating clear software supply-chain relevance for general-purpose AI systems. Evidence is explicit in the CVE entry and associated advisory.

References

Affected or Relevant Artifacts

  • Developer: tensorflow
  • Deployer: tensorflow
  • Artifact Details:
TypeName
Systemtensorflow

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.1
Vector StringCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Base Score2.5
Base Severity🟢 Low
Attack VectorLOCAL
Attack Complexity🔴 High
Privileges Required🟢 Low
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactNONE
Integrity ImpactNONE
Availability Impact🟢 Low

CWE

IDDescription
CWE-755CWE-755: Improper Handling of Exceptional Conditions

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2021-05-14
  • Version: 0.3.3
  • AVID Entry