vulnerability
SUSE: CVE-2020-26266: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Dec 10, 2020 | Aug 9, 2024 | Aug 9, 2024 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Dec 10, 2020
Added
Aug 9, 2024
Modified
Aug 9, 2024
Description
In affected versions of TensorFlow under certain cases a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to default initialize the quantized floating point types in Eigen. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
Solutions
suse-upgrade-bazel-skylib1-0-3-sourcesuse-upgrade-bazel3-7suse-upgrade-libiomp5suse-upgrade-libiomp5-gnu-hpcsuse-upgrade-libiomp5-gnu-openmpi2-hpcsuse-upgrade-libtensorflow2suse-upgrade-libtensorflow2-gnu-hpcsuse-upgrade-libtensorflow2-gnu-openmpi2-hpcsuse-upgrade-libtensorflow_cc2suse-upgrade-libtensorflow_cc2-gnu-hpcsuse-upgrade-libtensorflow_cc2-gnu-openmpi2-hpcsuse-upgrade-libtensorflow_framework2suse-upgrade-libtensorflow_framework2-gnu-hpcsuse-upgrade-libtensorflow_framework2-gnu-openmpi2-hpcsuse-upgrade-tensorflow2suse-upgrade-tensorflow2-develsuse-upgrade-tensorflow2-docsuse-upgrade-tensorflow2-gnu-hpcsuse-upgrade-tensorflow2-gnu-openmpi2-hpcsuse-upgrade-tensorflow2-litesuse-upgrade-tensorflow2-lite-develsuse-upgrade-tensorflow2_2_6_0-gnu-hpcsuse-upgrade-tensorflow2_2_6_0-gnu-hpc-develsuse-upgrade-tensorflow2_2_6_0-gnu-hpc-docsuse-upgrade-tensorflow2_2_6_0-gnu-openmpi2-hpcsuse-upgrade-tensorflow2_2_6_0-gnu-openmpi2-hpc-develsuse-upgrade-tensorflow2_2_6_0-gnu-openmpi2-hpc-doc
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.