-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from missing validation in the reshape operation's kernel implementation. The commit diff shows a critical OP_REQUIRES check was added to validate the number of dimensions against TensorShape::MaxDimensions() in reshape_op.h. The test case demonstrates that pre-patch versions would accept 254+ dimensions (exceeding TensorFlow's internal limits), causing integer overflows in shape calculations. The ReshapeOp::Compute function is directly responsible for processing the reshape operation and would have executed the faulty dimension handling logic before the patch.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tensorflow | pip | < 2.7.2 | 2.7.2 |
| tensorflow | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow | pip |
| >= 2.9.0, < 2.9.1 |
| 2.9.1 |
| tensorflow-cpu | pip | < 2.7.2 | 2.7.2 |
| tensorflow-cpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow-cpu | pip | >= 2.9.0, < 2.9.1 | 2.9.1 |
| tensorflow-gpu | pip | < 2.7.2 | 2.7.2 |
| tensorflow-gpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow-gpu | pip | >= 2.9.0, < 2.9.1 | 2.9.1 |
KEV Misses 88% of Exploited CVEs- Get the report