CVE-2020-26270

Name
CVE-2020-26270
Description
In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
NVD Severity
low
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m648-33qf-v3gp
Patch https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* tensorflow >= None < 1.15.5
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* tensorflow >= 2.0.0 < 2.0.4
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* tensorflow >= 2.1.0 < 2.1.3
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* tensorflow >= 2.2.0 < 2.2.2
cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:* tensorflow >= 2.3.0 < 2.3.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status