Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2020-15193: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2020-15193: SUSE Linux Security Advisory

Severity
6
CVSS
(AV:N/AC:L/Au:S/C:N/I:P/A:P)
Published
09/25/2020
Created
06/14/2021
Added
06/11/2021
Modified
10/22/2021

Description

In Tensorflow before versions 2.2.1 and 2.3.1, the implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor. However, there is nothing stopping users from passing in a Python object instead of a tensor. The uninitialized memory address is due to a `reinterpret_cast` Since the `PyObject` is a Python object, not a TensorFlow Tensor, the cast to `EagerTensor` fails. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.

Solution(s)

  • suse-upgrade-libtensorflow2
  • suse-upgrade-libtensorflow2-gnu-hpc
  • suse-upgrade-libtensorflow2-gnu-openmpi2-hpc
  • suse-upgrade-libtensorflow_cc2
  • suse-upgrade-libtensorflow_cc2-gnu-hpc
  • suse-upgrade-libtensorflow_cc2-gnu-openmpi2-hpc
  • suse-upgrade-libtensorflow_framework2
  • suse-upgrade-libtensorflow_framework2-gnu-hpc
  • suse-upgrade-libtensorflow_framework2-gnu-openmpi2-hpc
  • suse-upgrade-tensorflow2
  • suse-upgrade-tensorflow2-devel
  • suse-upgrade-tensorflow2-doc
  • suse-upgrade-tensorflow2-gnu-hpc
  • suse-upgrade-tensorflow2-gnu-openmpi2-hpc
  • suse-upgrade-tensorflow2-lite
  • suse-upgrade-tensorflow2-lite-devel
  • suse-upgrade-tensorflow2_2_1_2-gnu-hpc
  • suse-upgrade-tensorflow2_2_1_2-gnu-hpc-devel
  • suse-upgrade-tensorflow2_2_1_2-gnu-hpc-doc
  • suse-upgrade-tensorflow2_2_1_2-gnu-openmpi2-hpc
  • suse-upgrade-tensorflow2_2_1_2-gnu-openmpi2-hpc-devel
  • suse-upgrade-tensorflow2_2_1_2-gnu-openmpi2-hpc-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;