Linux Security
    Linux Security
    Linux Security

    openSUSE: 2020:1766-1: moderate: tensorflow2

    Date 29 Oct 2020
    236
    Posted By LinuxSecurity Advisories
    An update that fixes 16 vulnerabilities is now available.
       openSUSE Security Update: Security update for tensorflow2
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2020:1766-1
    Rating:             moderate
    References:         #1173314 #1175099 #1175789 #1177022 
    Cross-References:   CVE-2020-15190 CVE-2020-15191 CVE-2020-15192
                        CVE-2020-15193 CVE-2020-15194 CVE-2020-15195
                        CVE-2020-15202 CVE-2020-15203 CVE-2020-15204
                        CVE-2020-15205 CVE-2020-15206 CVE-2020-15207
                        CVE-2020-15208 CVE-2020-15209 CVE-2020-15210
                        CVE-2020-15211
    Affected Products:
                        openSUSE Leap 15.2
    ______________________________________________________________________________
    
       An update that fixes 16 vulnerabilities is now available.
    
    Description:
    
       This update for tensorflow2 fixes the following issues:
    
       - updated to 2.1.2 with following fixes (boo#1177022):
         * Fixes an undefined behavior causing a segfault in tf.raw_ops.Switch
           (CVE-2020-15190)
         * Fixes three vulnerabilities in conversion to DLPack format
           (CVE-2020-15191, CVE-2020-15192, CVE-2020-15193)
         * Fixes two vulnerabilities in SparseFillEmptyRowsGrad (CVE-2020-15194,
           CVE-2020-15195)
         * Fixes an integer truncation vulnerability in code using the work
           sharder API (CVE-2020-15202)
         * Fixes a format string vulnerability in tf.strings.as_string
           (CVE-2020-15203)
         * Fixes segfault raised by calling session-only ops in eager mode
           (CVE-2020-15204)
         * Fixes data leak and potential ASLR violation from
           tf.raw_ops.StringNGrams (CVE-2020-15205)
         * Fixes segfaults caused by incomplete SavedModel validation
           (CVE-2020-15206)
         * Fixes a data corruption due to a bug in negative indexing support in
           TFLite (CVE-2020-15207)
         * Fixes a data corruption due to dimension mismatch in TFLite
           (CVE-2020-15208)
         * Fixes several vulnerabilities in TFLite saved model format
           (CVE-2020-15209, CVE-2020-15210, CVE-2020-15211)
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 15.2:
    
          zypper in -t patch openSUSE-2020-1766=1
    
    
    
    Package List:
    
       - openSUSE Leap 15.2 (x86_64):
    
          libtensorflow2-2.1.2-lp152.7.3.1
          libtensorflow2-debuginfo-2.1.2-lp152.7.3.1
          libtensorflow2-gnu-hpc-2.1.2-lp152.7.3.1
          libtensorflow2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1
          libtensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
          libtensorflow2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1
          libtensorflow_cc2-2.1.2-lp152.7.3.1
          libtensorflow_cc2-debuginfo-2.1.2-lp152.7.3.1
          libtensorflow_cc2-gnu-hpc-2.1.2-lp152.7.3.1
          libtensorflow_cc2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1
          libtensorflow_cc2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
          libtensorflow_cc2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1
          libtensorflow_framework2-2.1.2-lp152.7.3.1
          libtensorflow_framework2-debuginfo-2.1.2-lp152.7.3.1
          libtensorflow_framework2-gnu-hpc-2.1.2-lp152.7.3.1
          libtensorflow_framework2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1
          libtensorflow_framework2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
          libtensorflow_framework2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1
          tensorflow2-2.1.2-lp152.7.3.1
          tensorflow2-debuginfo-2.1.2-lp152.7.3.1
          tensorflow2-debugsource-2.1.2-lp152.7.3.1
          tensorflow2-devel-2.1.2-lp152.7.3.1
          tensorflow2-doc-2.1.2-lp152.7.3.1
          tensorflow2-gnu-hpc-2.1.2-lp152.7.3.1
          tensorflow2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
          tensorflow2-lite-2.1.2-lp152.7.3.1
          tensorflow2-lite-debuginfo-2.1.2-lp152.7.3.1
          tensorflow2-lite-debugsource-2.1.2-lp152.7.3.1
          tensorflow2-lite-devel-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-hpc-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-hpc-debuginfo-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-hpc-debugsource-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-hpc-devel-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-hpc-doc-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-openmpi2-hpc-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-openmpi2-hpc-debuginfo-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-openmpi2-hpc-debugsource-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-openmpi2-hpc-devel-2.1.2-lp152.7.3.1
          tensorflow2_2_1_2-gnu-openmpi2-hpc-doc-2.1.2-lp152.7.3.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2020-15190.html
       https://www.suse.com/security/cve/CVE-2020-15191.html
       https://www.suse.com/security/cve/CVE-2020-15192.html
       https://www.suse.com/security/cve/CVE-2020-15193.html
       https://www.suse.com/security/cve/CVE-2020-15194.html
       https://www.suse.com/security/cve/CVE-2020-15195.html
       https://www.suse.com/security/cve/CVE-2020-15202.html
       https://www.suse.com/security/cve/CVE-2020-15203.html
       https://www.suse.com/security/cve/CVE-2020-15204.html
       https://www.suse.com/security/cve/CVE-2020-15205.html
       https://www.suse.com/security/cve/CVE-2020-15206.html
       https://www.suse.com/security/cve/CVE-2020-15207.html
       https://www.suse.com/security/cve/CVE-2020-15208.html
       https://www.suse.com/security/cve/CVE-2020-15209.html
       https://www.suse.com/security/cve/CVE-2020-15210.html
       https://www.suse.com/security/cve/CVE-2020-15211.html
       https://bugzilla.suse.com/1173314
       https://bugzilla.suse.com/1175099
       https://bugzilla.suse.com/1175789
       https://bugzilla.suse.com/1177022
    
    -- 
    

    Advisories

    LinuxSecurity Poll

    How long have you been using Linux?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/46-how-long-have-you-been-using-linux?task=poll.vote&format=json
    46
    radio
    [{"id":"160","title":"Just made the switch!","votes":"4","type":"x","order":"1","pct":9.52,"resources":[]},{"id":"161","title":"1-5 years","votes":"9","type":"x","order":"2","pct":21.43,"resources":[]},{"id":"162","title":"6-10 years","votes":"3","type":"x","order":"3","pct":7.14,"resources":[]},{"id":"163","title":">10 years - I'm a veteran!","votes":"26","type":"x","order":"4","pct":61.9,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.