In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-0217 In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
Github GHSA Github GHSA GHSA-m648-33qf-v3gp CHECK-fail in LSTM with zero-length input in TensorFlow
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T15:56:03.807Z

Reserved: 2020-10-01T00:00:00

Link: CVE-2020-26270

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-10T23:15:12.973

Modified: 2024-11-21T05:19:42.983

Link: CVE-2020-26270

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.