Логотип exploitDog
bind:CVE-2020-26270
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-26270

Количество 4

Количество 4

nvd логотип

CVE-2020-26270

около 5 лет назад

In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.

CVSS3: 4.4
EPSS: Низкий
debian логотип

CVE-2020-26270

около 5 лет назад

In affected versions of TensorFlow running an LSTM/GRU model where the ...

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-m648-33qf-v3gp

около 5 лет назад

CHECK-fail in LSTM with zero-length input in TensorFlow

CVSS3: 4.4
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:10014-1

больше 3 лет назад

Security update for tensorflow2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-26270

In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.

CVSS3: 4.4
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-26270

In affected versions of TensorFlow running an LSTM/GRU model where the ...

CVSS3: 4.4
0%
Низкий
около 5 лет назад
github логотип
GHSA-m648-33qf-v3gp

CHECK-fail in LSTM with zero-length input in TensorFlow

CVSS3: 4.4
0%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2022:10014-1

Security update for tensorflow2

больше 3 лет назад

Уязвимостей на страницу