vulnerability

SUSE: CVE-2021-37688: SUSE Linux Security Advisory

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Aug 12, 2021
Added
Oct 26, 2022
Modified
Oct 26, 2022

Description

TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer. We have patched the issue in GitHub commit 15691e456c7dc9bd6be203b09765b063bf4a380c. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

Solutions

suse-upgrade-bazel-skylib1-0-3-sourcesuse-upgrade-bazel3-7suse-upgrade-libiomp5suse-upgrade-libiomp5-gnu-hpcsuse-upgrade-libiomp5-gnu-openmpi2-hpcsuse-upgrade-libtensorflow2suse-upgrade-libtensorflow2-gnu-hpcsuse-upgrade-libtensorflow2-gnu-openmpi2-hpcsuse-upgrade-libtensorflow_cc2suse-upgrade-libtensorflow_cc2-gnu-hpcsuse-upgrade-libtensorflow_cc2-gnu-openmpi2-hpcsuse-upgrade-libtensorflow_framework2suse-upgrade-libtensorflow_framework2-gnu-hpcsuse-upgrade-libtensorflow_framework2-gnu-openmpi2-hpcsuse-upgrade-tensorflow2suse-upgrade-tensorflow2-develsuse-upgrade-tensorflow2-docsuse-upgrade-tensorflow2-gnu-hpcsuse-upgrade-tensorflow2-gnu-openmpi2-hpcsuse-upgrade-tensorflow2-litesuse-upgrade-tensorflow2-lite-develsuse-upgrade-tensorflow2_2_6_0-gnu-hpcsuse-upgrade-tensorflow2_2_6_0-gnu-hpc-develsuse-upgrade-tensorflow2_2_6_0-gnu-hpc-docsuse-upgrade-tensorflow2_2_6_0-gnu-openmpi2-hpcsuse-upgrade-tensorflow2_2_6_0-gnu-openmpi2-hpc-develsuse-upgrade-tensorflow2_2_6_0-gnu-openmpi2-hpc-doc
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.