Description
In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0217 | In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0. |
Github GHSA |
GHSA-m648-33qf-v3gp | CHECK-fail in LSTM with zero-length input in TensorFlow |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T15:56:03.807Z
Reserved: 2020-10-01T00:00:00.000Z
Link: CVE-2020-26270
No data.
Status : Modified
Published: 2020-12-10T23:15:12.973
Modified: 2024-11-21T05:19:42.983
Link: CVE-2020-26270
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA