{"id":"CVE-2020-26270","details":"In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.","aliases":["BIT-tensorflow-2020-26270","GHSA-m648-33qf-v3gp","PYSEC-2020-256","PYSEC-2020-301","PYSEC-2020-336"],"modified":"2026-03-13T22:16:16.186625Z","published":"2020-12-10T23:15:12.973Z","related":["GHSA-m648-33qf-v3gp","openSUSE-SU-2022:10014-1","openSUSE-SU-2024:12116-1"],"references":[{"type":"FIX","url":"https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3"},{"type":"FIX","url":"https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m648-33qf-v3gp"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tensorflow/tensorflow","events":[{"introduced":"0"},{"fixed":"3db52be7be81a87c623cdeb7f03d3767521c5246"},{"introduced":"64c3d382cadf7bbe8e7e99884bede8284ff67f56"},{"fixed":"cdf2c541c3dd3fb6d03cce4d23fc6c548bc9017c"},{"introduced":"e5bf8de410005de06a7ff5393fafdf832ef1d4ad"},{"fixed":"77f47d6ed6ca1f50b6f2c4919097e625d50398a9"},{"introduced":"2b96f3662bd776e277f86997659e61046b56c315"},{"fixed":"d745ff2a48cebf18e847e8b602a744e97e058946"},{"introduced":"b36436b087bd8e8701ef51718179037cccdfc26e"},{"fixed":"9edbe5075f79a4a95ed14a2be831f9b59e61f49d"},{"fixed":"14755416e364f17fb1870882fa778c7fec7f16e3"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.15.5"},{"introduced":"2.0.0"},{"fixed":"2.0.4"},{"introduced":"2.1.0"},{"fixed":"2.1.3"},{"introduced":"2.2.0"},{"fixed":"2.2.2"},{"introduced":"2.3.0"},{"fixed":"2.3.2"}]}}],"database_specific":{"vanir_signatures":[{"target":{"file":"tensorflow/stream_executor/cuda/cuda_dnn.cc"},"signature_version":"v1","signature_type":"Line","source":"https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3","deprecated":false,"id":"CVE-2020-26270-36cb9890","digest":{"threshold":0.9,"line_hashes":["166252882886534993164129206683886691984","82771836372170310932193629693836048928","130140444966903475628418281477362812430","31228978155751701708215333570039799818","71908040881237060325670982965864455659","165435079343752882710408888814154468784","130140444966903475628418281477362812430","31228978155751701708215333570039799818"]}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26270.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}]}