VYPR
Moderate severityNVD Advisory· Published Nov 5, 2021· Updated Aug 4, 2024

Null pointer exception in `DeserializeSparse`

CVE-2021-41215

Description

TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for DeserializeSparse can trigger a null pointer dereference. This is because the shape inference function assumes that the serialize_sparse tensor is a tensor with positive rank (and having 3 as the last dimension). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
tensorflowPyPI
>= 2.6.0, < 2.6.12.6.1
tensorflowPyPI
>= 2.5.0, < 2.5.22.5.2
tensorflowPyPI
< 2.4.42.4.4
tensorflow-cpuPyPI
>= 2.6.0, < 2.6.12.6.1
tensorflow-cpuPyPI
>= 2.5.0, < 2.5.22.5.2
tensorflow-cpuPyPI
< 2.4.42.4.4
tensorflow-gpuPyPI
>= 2.6.0, < 2.6.12.6.1
tensorflow-gpuPyPI
>= 2.5.0, < 2.5.22.5.2
tensorflow-gpuPyPI
< 2.4.42.4.4

Affected products

1

Patches

1
d3738dd70f1c

Ensuring that the input to DeserializeSparse is not a scalar.

https://github.com/tensorflow/tensorflowRohan JainOct 3, 2021via ghsa
2 files changed · +17 0
  • tensorflow/core/ops/sparse_ops.cc+3 0 modified
    @@ -16,6 +16,7 @@ limitations under the License.
     #include "tensorflow/core/framework/common_shape_fns.h"
     #include "tensorflow/core/framework/op.h"
     #include "tensorflow/core/framework/shape_inference.h"
    +#include "tensorflow/core/framework/types.pb.h"
     #include "tensorflow/core/platform/errors.h"
     
     namespace tensorflow {
    @@ -159,6 +160,8 @@ REGISTER_OP("DeserializeSparse")
         .Attr("Tserialized: {string, variant} = DT_STRING")
         .SetShapeFn([](InferenceContext* c) {
           // serialized sparse is [?, ..., ?, 3] vector.
    +      ShapeHandle unused_shape;
    +      TF_RETURN_IF_ERROR(c->WithRankAtLeast(c->input(0), 1, &unused_shape));
           DimensionHandle unused;
           TF_RETURN_IF_ERROR(c->WithValue(c->Dim(c->input(0), -1), 3, &unused));
           c->set_output(0, c->Matrix(InferenceContext::kUnknownDim,
    
  • tensorflow/python/kernel_tests/sparse_serialization_ops_test.py+14 0 modified
    @@ -16,10 +16,12 @@
     
     import numpy as np
     
    +from tensorflow.python.eager import def_function
     from tensorflow.python.framework import dtypes
     from tensorflow.python.framework import sparse_tensor as sparse_tensor_lib
     from tensorflow.python.framework import test_util
     from tensorflow.python.ops import array_ops
    +from tensorflow.python.ops import gen_resource_variable_ops
     from tensorflow.python.ops import sparse_ops
     from tensorflow.python.platform import test
     
    @@ -460,6 +462,18 @@ def testDeserializeManyFailsInvalidProto(self):
         self._testDeserializeFailsInvalidProtoHelper(
             sparse_ops.serialize_sparse, sparse_ops.deserialize_many_sparse)
     
    +  def testDeserializeInvalidVariant(self):
    +    mu = gen_resource_variable_ops.mutex_v2()
    +    mu_lock = gen_resource_variable_ops.mutex_lock(mutex=mu)
    +
    +    @def_function.function
    +    def f():
    +      return sparse_ops.deserialize_sparse(
    +          serialized_sparse=mu_lock, dtype=dtypes.int32)
    +
    +    with self.assertRaisesRegex(ValueError, r"Shape must be at least rank 1"):
    +      f()
    +
     
     if __name__ == "__main__":
       test.main()
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.