CVE-2020-15204NULL Pointer Dereference in Tensorflow

Severity
5.3MEDIUMNVD
EPSS
0.2%
top 55.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 25

Description

In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling `tf.raw_ops.GetSessionHandle` or `tf.raw_ops.GetSessionHandleV2` results in a null pointer dereference In linked snippet, in eager mode, `ctx->session_state()` returns `nullptr`. Since code immediately dereferences this, we get a segmentation fault. The issue is patched in commit 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1, and is released in TensorFlow versions 1.15.4, 2.0

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

NVDgoogle/tensorflow2.0.02.0.3+4
CVEListV5tensorflow/tensorflow< 1.15.4+4
PyPIintel/optimization_for_tensorflow2.0.02.0.3+5
NVDopensuse/leap15.2

Patches

🔴Vulnerability Details

4
CVEList
Segfault in Tensorflow2020-09-25
GHSA
Segfault in Tensorflow2020-09-25
OSV
CVE-2020-15204: In eager mode, TensorFlow before versions 12020-09-25
OSV
Segfault in Tensorflow2020-09-25

📋Vendor Advisories

1
Debian
CVE-2020-15204: tensorflow - In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 ...2020
CVE-2020-15204 — NULL Pointer Dereference in Tensorflow | cvebase