Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2020-15207: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2020-15207: SUSE Linux Security Advisory

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
09/25/2020
Created
03/19/2021
Added
03/18/2021
Modified
10/22/2021

Description

In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption. The issue is patched in commit 2d88f470dea2671b430884260f3626b1fe99830a, and is released in TensorFlow versions 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.

Solution(s)

  • suse-upgrade-libtensorflow2
  • suse-upgrade-libtensorflow2-gnu-hpc
  • suse-upgrade-libtensorflow2-gnu-openmpi2-hpc
  • suse-upgrade-libtensorflow_cc2
  • suse-upgrade-libtensorflow_cc2-gnu-hpc
  • suse-upgrade-libtensorflow_cc2-gnu-openmpi2-hpc
  • suse-upgrade-libtensorflow_framework2
  • suse-upgrade-libtensorflow_framework2-gnu-hpc
  • suse-upgrade-libtensorflow_framework2-gnu-openmpi2-hpc
  • suse-upgrade-tensorflow2
  • suse-upgrade-tensorflow2-devel
  • suse-upgrade-tensorflow2-doc
  • suse-upgrade-tensorflow2-gnu-hpc
  • suse-upgrade-tensorflow2-gnu-openmpi2-hpc
  • suse-upgrade-tensorflow2-lite
  • suse-upgrade-tensorflow2-lite-devel
  • suse-upgrade-tensorflow2_2_1_2-gnu-hpc
  • suse-upgrade-tensorflow2_2_1_2-gnu-hpc-devel
  • suse-upgrade-tensorflow2_2_1_2-gnu-hpc-doc
  • suse-upgrade-tensorflow2_2_1_2-gnu-openmpi2-hpc
  • suse-upgrade-tensorflow2_2_1_2-gnu-openmpi2-hpc-devel
  • suse-upgrade-tensorflow2_2_1_2-gnu-openmpi2-hpc-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;