AMPL
AMPL copied to clipboard
Bump tensorflow from 2.8.0 to 2.8.1 in /conda
Bumps tensorflow from 2.8.0 to 2.8.1.
Release notes
Sourced from tensorflow's releases.
TensorFlow 2.8.1
Release 2.8.1
This releases introduces several vulnerability fixes:
- Fixes a code injection in
saved_model_cli(CVE-2022-29216)- Fixes a missing validation which causes
TensorSummaryV2to crash (CVE-2022-29193)- Fixes a missing validation which crashes
QuantizeAndDequantizeV4Grad(CVE-2022-29192)- Fixes a missing validation which causes denial of service via
DeleteSessionTensor(CVE-2022-29194)- Fixes a missing validation which causes denial of service via
GetSessionTensor(CVE-2022-29191)- Fixes a missing validation which causes denial of service via
StagePeek(CVE-2022-29195)- Fixes a missing validation which causes denial of service via
UnsortedSegmentJoin(CVE-2022-29197)- Fixes a missing validation which causes denial of service via
LoadAndRemapMatrix(CVE-2022-29199)- Fixes a missing validation which causes denial of service via
SparseTensorToCSRSparseMatrix(CVE-2022-29198)- Fixes a missing validation which causes denial of service via
LSTMBlockCell(CVE-2022-29200)- Fixes a missing validation which causes denial of service via
Conv3DBackpropFilterV2(CVE-2022-29196)- Fixes a
CHECKfailure in depthwise ops via overflows (CVE-2021-41197)- Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (CVE-2022-29207)
- Fixes a segfault due to missing support for quantized types (CVE-2022-29205)
- Fixes a missing validation which results in undefined behavior in
SparseTensorDenseAdd(CVE-2022-29206)- Fixes a missing validation which results in undefined behavior in
QuantizedConv2D(CVE-2022-29201)- Fixes an integer overflow in
SpaceToBatchND(CVE-2022-29203)- Fixes a segfault and OOB write due to incomplete validation in
EditDistance(CVE-2022-29208)- Fixes a missing validation which causes denial of service via
Conv3DBackpropFilterV2(CVE-2022-29204)- Fixes a denial of service in
tf.ragged.constantdue to lack of validation (CVE-2022-29202)- Fixes a segfault when
tf.histogram_fixed_widthis called with NaN values (CVE-2022-29211)- Fixes a core dump when loading TFLite models with quantization (CVE-2022-29212)
- Fixes crashes stemming from incomplete validation in signal ops (CVE-2022-29213)
- Fixes a type confusion leading to
CHECK-failure based denial of service (CVE-2022-29209)- Fixes a heap buffer overflow due to incorrect hash function (CVE-2022-29210)
- Updates
curlto7.83.1to handle (CVE-2022-22576, (CVE-2022-27774, (CVE-2022-27775, (CVE-2022-27776, (CVE-2022-27778, (CVE-2022-27779, (CVE-2022-27780, (CVE-2022-27781, (CVE-2022-27782 and (CVE-2022-30115- Updates
zlibto1.2.12after1.2.11was pulled due to security issue
Changelog
Sourced from tensorflow's changelog.
Release 2.8.1
This releases introduces several vulnerability fixes:
- Fixes a code injection in
saved_model_cli(CVE-2022-29216)- Fixes a missing validation which causes
TensorSummaryV2to crash (CVE-2022-29193)- Fixes a missing validation which crashes
QuantizeAndDequantizeV4Grad(CVE-2022-29192)- Fixes a missing validation which causes denial of service via
DeleteSessionTensor(CVE-2022-29194)- Fixes a missing validation which causes denial of service via
GetSessionTensor(CVE-2022-29191)- Fixes a missing validation which causes denial of service via
StagePeek(CVE-2022-29195)- Fixes a missing validation which causes denial of service via
UnsortedSegmentJoin(CVE-2022-29197)- Fixes a missing validation which causes denial of service via
LoadAndRemapMatrix(CVE-2022-29199)- Fixes a missing validation which causes denial of service via
SparseTensorToCSRSparseMatrix(CVE-2022-29198)- Fixes a missing validation which causes denial of service via
LSTMBlockCell(CVE-2022-29200)- Fixes a missing validation which causes denial of service via
Conv3DBackpropFilterV2(CVE-2022-29196)- Fixes a
CHECKfailure in depthwise ops via overflows (CVE-2021-41197)- Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (CVE-2022-29207)
- Fixes a segfault due to missing support for quantized types (CVE-2022-29205)
- Fixes a missing validation which results in undefined behavior in
SparseTensorDenseAdd(CVE-2022-29206)- Fixes a missing validation which results in undefined behavior in
QuantizedConv2D(CVE-2022-29201)- Fixes an integer overflow in
SpaceToBatchND(CVE-2022-29203)- Fixes a segfault and OOB write due to incomplete validation in
EditDistance(CVE-2022-29208)- Fixes a missing validation which causes denial of service via
Conv3DBackpropFilterV2(CVE-2022-29204)- Fixes a denial of service in
tf.ragged.constantdue to lack of validation (CVE-2022-29202)- Fixes a segfault when
tf.histogram_fixed_widthis called with NaN values (CVE-2022-29211)- Fixes a core dump when loading TFLite models with quantization (CVE-2022-29212)
- Fixes crashes stemming from incomplete validation in signal ops (CVE-2022-29213)
- Fixes a type confusion leading to
CHECK-failure based denial of service (CVE-2022-29209)- Fixes a heap buffer overflow due to incorrect hash function (CVE-2022-29210)
- Updates
curlto7.83.1to handle (CVE-2022-22576, (CVE-2022-27774, (CVE-2022-27775, (CVE-2022-27776, (CVE-2022-27778, (CVE-2022-27779, (CVE-2022-27780, (CVE-2022-27781, (CVE-2022-27782 and (CVE-2022-30115- Updates
zlibto1.2.12after1.2.11was pulled due to security issueRelease 2.7.2
This releases introduces several vulnerability fixes:
- Fixes a code injection in
saved_model_cli(CVE-2022-29216)- Fixes a missing validation which causes
TensorSummaryV2to crash (CVE-2022-29193)- Fixes a missing validation which crashes
QuantizeAndDequantizeV4Grad(CVE-2022-29192)- Fixes a missing validation which causes denial of service via
DeleteSessionTensor(CVE-2022-29194)- Fixes a missing validation which causes denial of service via
GetSessionTensor(CVE-2022-29191)- Fixes a missing validation which causes denial of service via
StagePeek(CVE-2022-29195)- Fixes a missing validation which causes denial of service via
UnsortedSegmentJoin(CVE-2022-29197)- Fixes a missing validation which causes denial of service via
LoadAndRemapMatrix(CVE-2022-29199)- Fixes a missing validation which causes denial of service via
SparseTensorToCSRSparseMatrix(CVE-2022-29198)- Fixes a missing validation which causes denial of service via
LSTMBlockCell(CVE-2022-29200)- Fixes a missing validation which causes denial of service via
Conv3DBackpropFilterV2(CVE-2022-29196)- Fixes a
CHECKfailure in depthwise ops via overflows (CVE-2021-41197)- Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (CVE-2022-29207)
- Fixes a segfault due to missing support for quantized types (CVE-2022-29205)
- Fixes a missing validation which results in undefined behavior in
SparseTensorDenseAdd(CVE-2022-29206)
... (truncated)
Commits
0516d4dMerge pull request #56035 from tensorflow-jenkins/relnotes-2.8.1-420525faa9fUpdate RELEASE.md0d75d6aMerge pull request #56074 from tensorflow/fix-r2.8-buildb82dff5Install dep as user1e74687Merge pull request #56071 from tensorflow/fix-r2.8-build86bbc70Another attempt at fixing pypa/setuptools#3293fd5fbebMerge pull request #56068 from tensorflow/mm-cp-52488e5072f6fe44411d70c6af09e...bdb80bcMerge pull request #56060 from yongtang:curl-7.83.13f8784cMerge pull request #56064 from tensorflow/mihaimaruseac-patch-10da453fFix pip install ordering- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)@dependabot use these labelswill set the current labels as the default for future PRs for this repo and language@dependabot use these reviewerswill set the current reviewers as the default for future PRs for this repo and language@dependabot use these assigneeswill set the current assignees as the default for future PRs for this repo and language@dependabot use this milestonewill set the current milestone as the default for future PRs for this repo and language
You can disable automated security fix PRs for this repo from the Security Alerts page.