Safety vulnerability ID: 57978
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Tensorflow-rocm versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, and 2.3.1 include a fix for CVE-2020-15204: In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not set the session state. Hence, calling "tf.raw_ops.GetSessionHandle" or "tf.raw_ops.GetSessionHandleV2" results in a null pointer dereference In linked snippet, in eager mode, "ctx->session_state()" returns "nullptr". Since code immediately dereferences this, we get a segmentation fault. The issue was patched in commit 9a133d73ae4b4664d22bd1aa6d654fec13c52ee1
Latest version: 2.14.0.600
TensorFlow is an open source machine learning framework for everyone.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application