CVE-2020-15204

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15204
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15204.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15204
Aliases
Downstream
Related
Published
2020-09-25T19:15:15Z
Modified
2025-10-14T18:08:14.697495Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling tf.raw_ops.GetSessionHandle or tf.raw_ops.GetSessionHandleV2 results in a null pointer dereference In linked snippet, in eager mode, ctx->session_state() returns nullptr. Since code immediately dereferences this, we get a segmentation fault. The issue is patched in commit 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.

References

Affected packages

Git / github.com/tensorflow/tensorflow

Affected ranges

Type
GIT
Repo
https://github.com/tensorflow/tensorflow
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.12.0-rc0
0.12.0-rc1
0.12.1
0.5.0
0.6.0

v0.*

v0.10.0
v0.10.0rc0
v0.11.0
v0.11.0rc0
v0.11.0rc1
v0.11.0rc2
v0.12.0
v0.7.0
v0.7.1
v0.8.0rc0
v0.9.0
v0.9.0rc0

v1.*

v1.0.0
v1.0.0-alpha
v1.0.0-rc0
v1.0.0-rc1
v1.0.0-rc2
v1.1.0
v1.1.0-rc0
v1.1.0-rc1
v1.1.0-rc2
v1.12.0
v1.12.0-rc0
v1.12.0-rc1
v1.12.0-rc2
v1.12.1
v1.2.0
v1.2.0-rc0
v1.2.0-rc1
v1.2.0-rc2
v1.3.0-rc0
v1.3.0-rc1
v1.5.0
v1.5.0-rc0
v1.5.0-rc1
v1.6.0
v1.6.0-rc0
v1.6.0-rc1
v1.7.0
v1.7.0-rc0
v1.7.0-rc1
v1.8.0
v1.8.0-rc0
v1.8.0-rc1
v1.9.0
v1.9.0-rc0
v1.9.0-rc1
v1.9.0-rc2

v2.*

v2.3.0
v2.3.0-rc0
v2.3.0-rc1
v2.3.0-rc2

Database specific

{
    "vanir_signatures": [
        {
            "source": "https://github.com/tensorflow/tensorflow/commit/9a133d73ae4b4664d22bd1aa6d654fec13c52ee1",
            "signature_version": "v1",
            "deprecated": false,
            "target": {
                "file": "tensorflow/core/kernels/session_ops.cc"
            },
            "id": "CVE-2020-15204-9ee6decc",
            "digest": {
                "line_hashes": [
                    "189352979120194311327371559395119878939",
                    "240616599412011448759509449000224441154",
                    "145066807906330921007866302987167158980",
                    "160262667934512112962314419515803663363",
                    "15626677433426552320500466918107972585",
                    "248719977052199874095317382270256044896",
                    "12019719942517677709544006141306629999",
                    "273563587906890098515499487317187043849",
                    "14152470903489550199196908644522954805"
                ],
                "threshold": 0.9
            },
            "signature_type": "Line"
        }
    ]
}