| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tensorflow | pip | < 2.6.4 | 2.6.4 |
| tensorflow | pip | >= 2.7.0, < 2.7.2 | 2.7.2 |
| tensorflow | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow-cpu | pip | < 2.6.4 | 2.6.4 |
| tensorflow-cpu | pip | >= 2.7.0, < 2.7.2 | 2.7.2 |
| tensorflow-cpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow-gpu | pip | < 2.6.4 | 2.6.4 |
| tensorflow-gpu | pip | >= 2.7.0, < 2.7.2 | 2.7.2 |
| tensorflow-gpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
The vulnerability stems from the code in HistogramFixedWidthFunctor's Compute method where values are processed without checking for NaNs. The critical operation ((values - range_start)/step).cast<int32>() would produce NaN when inputs contain NaN, which is undefined for integer casting. The patch explicitly adds NaN detection using values.isnan() before proceeding with calculations, confirming this was the vulnerable code path. The CPU-specific implementation matches the vulnerability's scope as described.
KEV Misses 88% of Exploited CVEs- Get the report