-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tensorflow | pip | < 2.7.2 | 2.7.2 |
| tensorflow | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow | pip | >= 2.9.0, < 2.9.1 | 2.9.1 |
| tensorflow-cpu | pip | < 2.7.2 | 2.7.2 |
| tensorflow-cpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow-cpu | pip | >= 2.9.0, < 2.9.1 | 2.9.1 |
| tensorflow-gpu | pip | < 2.7.2 | 2.7.2 |
| tensorflow-gpu | pip | >= 2.8.0, < 2.8.1 | 2.8.1 |
| tensorflow-gpu | pip | >= 2.9.0, < 2.9.1 | 2.9.1 |
The vulnerability stems from missing rank checks in QuantizedInstanceNorm's input validation. The commit 785d67a adds OP_REQUIRES checks to enforce scalar inputs for x_min/x_max, confirming the vulnerability existed in this function. The provided PoC demonstrates triggering the crash with non-scalar x_min, and the CWE-20 classification aligns with improper input validation. Other functions in the commit received similar fixes, but the advisory specifically calls out QuantizedInstanceNorm as the vulnerable entry point.