openSUSE Security Update: Security update for tensorflow2
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2020:1766-1
Rating:             moderate
References:         #1173314 #1175099 #1175789 #1177022 
Cross-References:   CVE-2020-15190 CVE-2020-15191 CVE-2020-15192
                    CVE-2020-15193 CVE-2020-15194 CVE-2020-15195
                    CVE-2020-15202 CVE-2020-15203 CVE-2020-15204
                    CVE-2020-15205 CVE-2020-15206 CVE-2020-15207
                    CVE-2020-15208 CVE-2020-15209 CVE-2020-15210
                    CVE-2020-15211
Affected Products:
                    openSUSE Leap 15.2
______________________________________________________________________________

   An update that fixes 16 vulnerabilities is now available.

Description:

   This update for tensorflow2 fixes the following issues:

   - updated to 2.1.2 with following fixes (boo#1177022):
     * Fixes an undefined behavior causing a segfault in tf.raw_ops.Switch
       (CVE-2020-15190)
     * Fixes three vulnerabilities in conversion to DLPack format
       (CVE-2020-15191, CVE-2020-15192, CVE-2020-15193)
     * Fixes two vulnerabilities in SparseFillEmptyRowsGrad (CVE-2020-15194,
       CVE-2020-15195)
     * Fixes an integer truncation vulnerability in code using the work
       sharder API (CVE-2020-15202)
     * Fixes a format string vulnerability in tf.strings.as_string
       (CVE-2020-15203)
     * Fixes segfault raised by calling session-only ops in eager mode
       (CVE-2020-15204)
     * Fixes data leak and potential ASLR violation from
       tf.raw_ops.StringNGrams (CVE-2020-15205)
     * Fixes segfaults caused by incomplete SavedModel validation
       (CVE-2020-15206)
     * Fixes a data corruption due to a bug in negative indexing support in
       TFLite (CVE-2020-15207)
     * Fixes a data corruption due to dimension mismatch in TFLite
       (CVE-2020-15208)
     * Fixes several vulnerabilities in TFLite saved model format
       (CVE-2020-15209, CVE-2020-15210, CVE-2020-15211)


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2020-1766=1



Package List:

   - openSUSE Leap 15.2 (x86_64):

      libtensorflow2-2.1.2-lp152.7.3.1
      libtensorflow2-debuginfo-2.1.2-lp152.7.3.1
      libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1
      libtensorflow2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1
      libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
      libtensorflow2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1
      libtensorflow_cc2-2.1.2-lp152.7.3.1
      libtensorflow_cc2-debuginfo-2.1.2-lp152.7.3.1
      libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1
      libtensorflow_cc2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1
      libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
      libtensorflow_cc2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1
      libtensorflow_framework2-2.1.2-lp152.7.3.1
      libtensorflow_framework2-debuginfo-2.1.2-lp152.7.3.1
      libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1
      libtensorflow_framework2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1
      libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
      libtensorflow_framework2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1
      tensorflow2-2.1.2-lp152.7.3.1
      tensorflow2-debuginfo-2.1.2-lp152.7.3.1
      tensorflow2-debugsource-2.1.2-lp152.7.3.1
      tensorflow2-devel-2.1.2-lp152.7.3.1
      tensorflow2-doc-2.1.2-lp152.7.3.1
      tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1
      tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
      tensorflow2-lite-2.1.2-lp152.7.3.1
      tensorflow2-lite-debuginfo-2.1.2-lp152.7.3.1
      tensorflow2-lite-debugsource-2.1.2-lp152.7.3.1
      tensorflow2-lite-devel-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-hpc-debugsource-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-openmpi2-hpc-debugsource-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1
      tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1


References:

   https://www.suse.com/security/cve/CVE-2020-15190.html
   https://www.suse.com/security/cve/CVE-2020-15191.html
   https://www.suse.com/security/cve/CVE-2020-15192.html
   https://www.suse.com/security/cve/CVE-2020-15193.html
   https://www.suse.com/security/cve/CVE-2020-15194.html
   https://www.suse.com/security/cve/CVE-2020-15195.html
   https://www.suse.com/security/cve/CVE-2020-15202.html
   https://www.suse.com/security/cve/CVE-2020-15203.html
   https://www.suse.com/security/cve/CVE-2020-15204.html
   https://www.suse.com/security/cve/CVE-2020-15205.html
   https://www.suse.com/security/cve/CVE-2020-15206.html
   https://www.suse.com/security/cve/CVE-2020-15207.html
   https://www.suse.com/security/cve/CVE-2020-15208.html
   https://www.suse.com/security/cve/CVE-2020-15209.html
   https://www.suse.com/security/cve/CVE-2020-15210.html
   https://www.suse.com/security/cve/CVE-2020-15211.html
   https://bugzilla.suse.com/1173314
   https://bugzilla.suse.com/1175099
   https://bugzilla.suse.com/1175789
   https://bugzilla.suse.com/1177022

-- 

openSUSE: 2020:1766-1: moderate: tensorflow2

October 29, 2020
An update that fixes 16 vulnerabilities is now available.

Description

This update for tensorflow2 fixes the following issues: - updated to 2.1.2 with following fixes (boo#1177022): * Fixes an undefined behavior causing a segfault in tf.raw_ops.Switch (CVE-2020-15190) * Fixes three vulnerabilities in conversion to DLPack format (CVE-2020-15191, CVE-2020-15192, CVE-2020-15193) * Fixes two vulnerabilities in SparseFillEmptyRowsGrad (CVE-2020-15194, CVE-2020-15195) * Fixes an integer truncation vulnerability in code using the work sharder API (CVE-2020-15202) * Fixes a format string vulnerability in tf.strings.as_string (CVE-2020-15203) * Fixes segfault raised by calling session-only ops in eager mode (CVE-2020-15204) * Fixes data leak and potential ASLR violation from tf.raw_ops.StringNGrams (CVE-2020-15205) * Fixes segfaults caused by incomplete SavedModel validation (CVE-2020-15206) * Fixes a data corruption due to a bug in negative indexing support in TFLite (CVE-2020-15207) * Fixes a data corruption due to dimension mismatch in TFLite (CVE-2020-15208) * Fixes several vulnerabilities in TFLite saved model format (CVE-2020-15209, CVE-2020-15210, CVE-2020-15211)

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.2: zypper in -t patch openSUSE-2020-1766=1


Package List

- openSUSE Leap 15.2 (x86_64): libtensorflow2-2.1.2-lp152.7.3.1 libtensorflow2-debuginfo-2.1.2-lp152.7.3.1 libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 libtensorflow2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1 libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 libtensorflow2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1 libtensorflow_cc2-2.1.2-lp152.7.3.1 libtensorflow_cc2-debuginfo-2.1.2-lp152.7.3.1 libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1 libtensorflow_cc2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1 libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 libtensorflow_cc2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1 libtensorflow_framework2-2.1.2-lp152.7.3.1 libtensorflow_framework2-debuginfo-2.1.2-lp152.7.3.1 libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1 libtensorflow_framework2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1 libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 libtensorflow_framework2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1 tensorflow2-2.1.2-lp152.7.3.1 tensorflow2-debuginfo-2.1.2-lp152.7.3.1 tensorflow2-debugsource-2.1.2-lp152.7.3.1 tensorflow2-devel-2.1.2-lp152.7.3.1 tensorflow2-doc-2.1.2-lp152.7.3.1 tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1 tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 tensorflow2-lite-2.1.2-lp152.7.3.1 tensorflow2-lite-debuginfo-2.1.2-lp152.7.3.1 tensorflow2-lite-debugsource-2.1.2-lp152.7.3.1 tensorflow2-lite-devel-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-hpc-debugsource-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-openmpi2-hpc-debugsource-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1 tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1


References

https://www.suse.com/security/cve/CVE-2020-15190.html https://www.suse.com/security/cve/CVE-2020-15191.html https://www.suse.com/security/cve/CVE-2020-15192.html https://www.suse.com/security/cve/CVE-2020-15193.html https://www.suse.com/security/cve/CVE-2020-15194.html https://www.suse.com/security/cve/CVE-2020-15195.html https://www.suse.com/security/cve/CVE-2020-15202.html https://www.suse.com/security/cve/CVE-2020-15203.html https://www.suse.com/security/cve/CVE-2020-15204.html https://www.suse.com/security/cve/CVE-2020-15205.html https://www.suse.com/security/cve/CVE-2020-15206.html https://www.suse.com/security/cve/CVE-2020-15207.html https://www.suse.com/security/cve/CVE-2020-15208.html https://www.suse.com/security/cve/CVE-2020-15209.html https://www.suse.com/security/cve/CVE-2020-15210.html https://www.suse.com/security/cve/CVE-2020-15211.html https://bugzilla.suse.com/1173314 https://bugzilla.suse.com/1175099 https://bugzilla.suse.com/1175789 https://bugzilla.suse.com/1177022--


Severity
Announcement ID: openSUSE-SU-2020:1766-1
Rating: moderate
Affected Products: openSUSE Leap 15.2

Related News