-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tensorflow | pip | < 2.6.4 | 2.6.4 |
| tensorflow | pip | >= 2.7.0, < 2.7.2 | 2.7.2 |
| tensorflow | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow-cpu | pip | < 2.6.4 | 2.6.4 |
| tensorflow-cpu | pip | >= 2.7.0, < 2.7.2 | 2.7.2 |
| tensorflow-cpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow-gpu | pip | < 2.6.4 | 2.6.4 |
| tensorflow-gpu | pip | >= 2.7.0, < 2.7.2 | 2.7.2 |
| tensorflow-gpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
The vulnerability stems from missing validation checks in QuantizedConv2D's implementation. The commit diff shows added OP_REQUIRES checks to enforce scalar shape for min/max inputs, which were previously absent. The Compute function in quantized_conv_ops.cc directly accessed these tensors' 0th element without validation, causing undefined behavior when inputs were empty. The patched code explicitly validates tensor ranks, confirming the vulnerable code path was in the original Compute implementation.