UBUNTU-CVE-2026-0897

Source
https://ubuntu.com/security/CVE-2026-0897
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0897.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-0897
Upstream
Published
2026-01-15T14:16:00Z
Modified
2026-01-21T18:23:50.984923Z
Severity
  • 7.1 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the Python interpreter via a crafted .keras archive containing a valid model.weights.h5 file whose dataset declares an extremely large shape.

References

Affected packages

Ubuntu:18.04:LTS / keras

Package

Name
keras
Purl
pkg:deb/ubuntu/keras@2.1.1-1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.7-2

2.*

2.1.1-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.1.1-1",
            "binary_name": "python3-keras"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0897.json"

Ubuntu:20.04:LTS / keras

Package

Name
keras
Purl
pkg:deb/ubuntu/keras@2.2.4-1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.4-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.2.4-1",
            "binary_name": "python3-keras"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-0897.json"