DEBIAN-CVE-2026-0897

Source
https://security-tracker.debian.org/tracker/CVE-2026-0897
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-0897.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-0897
Upstream
Published
2026-01-15T14:16:26.890Z
Modified
2026-01-24T11:16:21.541877Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the Python interpreter via a crafted .keras archive containing a valid model.weights.h5 file whose dataset declares an extremely large shape.

References

Affected packages

Debian:11 / keras

Package

Name
keras
Purl
pkg:deb/debian/keras?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.3.1+dfsg-3
2.3.1+dfsg2-1

Ecosystem specific

{
    "urgency": "end-of-life"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-0897.json"