Description
In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
Published: 2020-12-10
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-0217 In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
Github GHSA Github GHSA GHSA-m648-33qf-v3gp CHECK-fail in LSTM with zero-length input in TensorFlow
History

No history.

Subscriptions

Google Tensorflow
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T15:56:03.807Z

Reserved: 2020-10-01T00:00:00.000Z

Link: CVE-2020-26270

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-10T23:15:12.973

Modified: 2024-11-21T05:19:42.983

Link: CVE-2020-26270

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses