Bump tensorflow from 1.6.0 to 2.5.1 #42

Open
opened 2025-10-14 17:16:27 -06:00 by navan · 0 comments
Owner

Originally created by @dependabot[bot] on 8/25/2021

Bumps tensorflow from 1.6.0 to 2.5.1.

Release notes

Sourced from tensorflow's releases.

TensorFlow 2.5.1

Release 2.5.1

This release introduces several vulnerability fixes:

  • Fixes a heap out of bounds access in sparse reduction operations (CVE-2021-37635)
  • Fixes a floating point exception in SparseDenseCwiseDiv (CVE-2021-37636)
  • Fixes a null pointer dereference in CompressElement (CVE-2021-37637)
  • Fixes a null pointer dereference in RaggedTensorToTensor (CVE-2021-37638)
  • Fixes a null pointer dereference and a heap OOB read arising from operations restoring tensors (CVE-2021-37639)
  • Fixes an integer division by 0 in sparse reshaping (CVE-2021-37640)
  • Fixes a division by 0 in ResourceScatterDiv (CVE-2021-37642)
  • Fixes a heap OOB in RaggedGather (CVE-2021-37641)
  • Fixes a std::abort raised from TensorListReserve (CVE-2021-37644)
  • Fixes a null pointer dereference in MatrixDiagPartOp (CVE-2021-37643)
  • Fixes an integer overflow due to conversion to unsigned (CVE-2021-37645)
  • Fixes a bad allocation error in StringNGrams caused by integer conversion (CVE-2021-37646)
  • Fixes a null pointer dereference in SparseTensorSliceDataset (CVE-2021-37647)
  • Fixes an incorrect validation of SaveV2 inputs (CVE-2021-37648)
  • Fixes a null pointer dereference in UncompressElement (CVE-2021-37649)
  • Fixes a segfault and a heap buffer overflow in {Experimental,}DatasetToTFRecord (CVE-2021-37650)
  • Fixes a heap buffer overflow in FractionalAvgPoolGrad (CVE-2021-37651)
  • Fixes a use after free in boosted trees creation (CVE-2021-37652)
  • Fixes a division by 0 in ResourceGather (CVE-2021-37653)
  • Fixes a heap OOB and a CHECK fail in ResourceGather (CVE-2021-37654)
  • Fixes a heap OOB in ResourceScatterUpdate (CVE-2021-37655)
  • Fixes an undefined behavior arising from reference binding to nullptr in RaggedTensorToSparse (CVE-2021-37656)
  • Fixes an undefined behavior arising from reference binding to nullptr in MatrixDiagV* ops (CVE-2021-37657)
  • Fixes an undefined behavior arising from reference binding to nullptr in MatrixSetDiagV* ops (CVE-2021-37658)
  • Fixes an undefined behavior arising from reference binding to nullptr and heap OOB in binary cwise ops (CVE-2021-37659)
  • Fixes a division by 0 in inplace operations (CVE-2021-37660)
  • Fixes a crash caused by integer conversion to unsigned (CVE-2021-37661)
  • Fixes an undefined behavior arising from reference binding to nullptr in boosted trees (CVE-2021-37662)
  • Fixes a heap OOB in boosted trees (CVE-2021-37664)
  • Fixes vulnerabilities arising from incomplete validation in QuantizeV2 (CVE-2021-37663)
  • Fixes vulnerabilities arising from incomplete validation in MKL requantization (CVE-2021-37665)
  • Fixes an undefined behavior arising from reference binding to nullptr in RaggedTensorToVariant (CVE-2021-37666)
  • Fixes an undefined behavior arising from reference binding to nullptr in unicode encoding (CVE-2021-37667)
  • Fixes an FPE in tf.raw_ops.UnravelIndex (CVE-2021-37668)
  • Fixes a crash in NMS ops caused by integer conversion to unsigned (CVE-2021-37669)
  • Fixes a heap OOB in UpperBound and LowerBound (CVE-2021-37670)
  • Fixes an undefined behavior arising from reference binding to nullptr in map operations (CVE-2021-37671)
  • Fixes a heap OOB in SdcaOptimizerV2 (CVE-2021-37672)
  • Fixes a CHECK-fail in MapStage (CVE-2021-37673)
  • Fixes a vulnerability arising from incomplete validation in MaxPoolGrad (CVE-2021-37674)
  • Fixes an undefined behavior arising from reference binding to nullptr in shape inference (CVE-2021-37676)
  • Fixes a division by 0 in most convolution operators (CVE-2021-37675)
  • Fixes vulnerabilities arising from missing validation in shape inference for Dequantize (CVE-2021-37677)
  • Fixes an arbitrary code execution due to YAML deserialization (CVE-2021-37678)
  • Fixes a heap OOB in nested tf.map_fn with RaggedTensors (CVE-2021-37679)

... (truncated)

Changelog

Sourced from tensorflow's changelog.

Release 2.5.1

This release introduces several vulnerability fixes:

  • Fixes a heap out of bounds access in sparse reduction operations (CVE-2021-37635)
  • Fixes a floating point exception in SparseDenseCwiseDiv (CVE-2021-37636)
  • Fixes a null pointer dereference in CompressElement (CVE-2021-37637)
  • Fixes a null pointer dereference in RaggedTensorToTensor (CVE-2021-37638)
  • Fixes a null pointer dereference and a heap OOB read arising from operations restoring tensors (CVE-2021-37639)
  • Fixes an integer division by 0 in sparse reshaping (CVE-2021-37640)
  • Fixes a division by 0 in ResourceScatterDiv (CVE-2021-37642)
  • Fixes a heap OOB in RaggedGather (CVE-2021-37641)
  • Fixes a std::abort raised from TensorListReserve (CVE-2021-37644)
  • Fixes a null pointer dereference in MatrixDiagPartOp (CVE-2021-37643)
  • Fixes an integer overflow due to conversion to unsigned (CVE-2021-37645)
  • Fixes a bad allocation error in StringNGrams caused by integer conversion (CVE-2021-37646)
  • Fixes a null pointer dereference in SparseTensorSliceDataset (CVE-2021-37647)
  • Fixes an incorrect validation of SaveV2 inputs (CVE-2021-37648)
  • Fixes a null pointer dereference in UncompressElement (CVE-2021-37649)
  • Fixes a segfault and a heap buffer overflow in {Experimental,}DatasetToTFRecord (CVE-2021-37650)
  • Fixes a heap buffer overflow in FractionalAvgPoolGrad (CVE-2021-37651)
  • Fixes a use after free in boosted trees creation (CVE-2021-37652)
  • Fixes a division by 0 in ResourceGather (CVE-2021-37653)
  • Fixes a heap OOB and a CHECK fail in ResourceGather (CVE-2021-37654)
  • Fixes a heap OOB in ResourceScatterUpdate (CVE-2021-37655)
  • Fixes an undefined behavior arising from reference binding to nullptr in RaggedTensorToSparse

... (truncated)

Commits
  • 8222c1c Merge pull request #51381 from tensorflow/mm-fix-r2.5-build
  • d584260 Disable broken/flaky test
  • f6c6ce3 Merge pull request #51367 from tensorflow-jenkins/version-numbers-2.5.1-17468
  • 3ca7812 Update version numbers to 2.5.1
  • 4fdf683 Merge pull request #51361 from tensorflow/mm-update-relnotes-on-r2.5
  • 05fc01a Put CVE numbers for fixes in parentheses
  • bee1dc4 Update release notes for the new patch release
  • 47beb4c Merge pull request #50597 from kruglov-dmitry/v2.5.0-sync-abseil-cmake-bazel
  • 6f39597 Merge pull request #49383 from ashahab/abin-load-segfault-r2.5
  • 0539b34 Merge pull request #48979 from liufengdb/r2.5-cherrypick
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

You can disable automated security fix PRs for this repo from the Security Alerts page.

*Originally created by @dependabot[bot] on 8/25/2021* Bumps [tensorflow](https://github.com/tensorflow/tensorflow) from 1.6.0 to 2.5.1. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/releases">tensorflow's releases</a>.</em></p> <blockquote> <h2>TensorFlow 2.5.1</h2> <h1>Release 2.5.1</h1> <p>This release introduces several vulnerability fixes:</p> <ul> <li>Fixes a heap out of bounds access in sparse reduction operations (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37635">CVE-2021-37635</a>)</li> <li>Fixes a floating point exception in <code>SparseDenseCwiseDiv</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37636">CVE-2021-37636</a>)</li> <li>Fixes a null pointer dereference in <code>CompressElement</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37637">CVE-2021-37637</a>)</li> <li>Fixes a null pointer dereference in <code>RaggedTensorToTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37638">CVE-2021-37638</a>)</li> <li>Fixes a null pointer dereference and a heap OOB read arising from operations restoring tensors (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37639">CVE-2021-37639</a>)</li> <li>Fixes an integer division by 0 in sparse reshaping (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37640">CVE-2021-37640</a>)</li> <li>Fixes a division by 0 in <code>ResourceScatterDiv</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37642">CVE-2021-37642</a>)</li> <li>Fixes a heap OOB in <code>RaggedGather</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37641">CVE-2021-37641</a>)</li> <li>Fixes a <code>std::abort</code> raised from <code>TensorListReserve</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37644">CVE-2021-37644</a>)</li> <li>Fixes a null pointer dereference in <code>MatrixDiagPartOp</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37643">CVE-2021-37643</a>)</li> <li>Fixes an integer overflow due to conversion to unsigned (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37645">CVE-2021-37645</a>)</li> <li>Fixes a bad allocation error in <code>StringNGrams</code> caused by integer conversion (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37646">CVE-2021-37646</a>)</li> <li>Fixes a null pointer dereference in <code>SparseTensorSliceDataset</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37647">CVE-2021-37647</a>)</li> <li>Fixes an incorrect validation of <code>SaveV2</code> inputs (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37648">CVE-2021-37648</a>)</li> <li>Fixes a null pointer dereference in <code>UncompressElement</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37649">CVE-2021-37649</a>)</li> <li>Fixes a segfault and a heap buffer overflow in <code>{Experimental,}DatasetToTFRecord</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37650">CVE-2021-37650</a>)</li> <li>Fixes a heap buffer overflow in <code>FractionalAvgPoolGrad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37651">CVE-2021-37651</a>)</li> <li>Fixes a use after free in boosted trees creation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37652">CVE-2021-37652</a>)</li> <li>Fixes a division by 0 in <code>ResourceGather</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37653">CVE-2021-37653</a>)</li> <li>Fixes a heap OOB and a <code>CHECK</code> fail in <code>ResourceGather</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37654">CVE-2021-37654</a>)</li> <li>Fixes a heap OOB in <code>ResourceScatterUpdate</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37655">CVE-2021-37655</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr in <code>RaggedTensorToSparse</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37656">CVE-2021-37656</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr in <code>MatrixDiagV*</code> ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37657">CVE-2021-37657</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr in <code>MatrixSetDiagV*</code> ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37658">CVE-2021-37658</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr and heap OOB in binary cwise ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37659">CVE-2021-37659</a>)</li> <li>Fixes a division by 0 in inplace operations (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37660">CVE-2021-37660</a>)</li> <li>Fixes a crash caused by integer conversion to unsigned (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37661">CVE-2021-37661</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr in boosted trees (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37662">CVE-2021-37662</a>)</li> <li>Fixes a heap OOB in boosted trees (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37664">CVE-2021-37664</a>)</li> <li>Fixes vulnerabilities arising from incomplete validation in <code>QuantizeV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37663">CVE-2021-37663</a>)</li> <li>Fixes vulnerabilities arising from incomplete validation in MKL requantization (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37665">CVE-2021-37665</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr in <code>RaggedTensorToVariant</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37666">CVE-2021-37666</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr in unicode encoding (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37667">CVE-2021-37667</a>)</li> <li>Fixes an FPE in <code>tf.raw_ops.UnravelIndex</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37668">CVE-2021-37668</a>)</li> <li>Fixes a crash in NMS ops caused by integer conversion to unsigned (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37669">CVE-2021-37669</a>)</li> <li>Fixes a heap OOB in <code>UpperBound</code> and <code>LowerBound</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37670">CVE-2021-37670</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr in map operations (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37671">CVE-2021-37671</a>)</li> <li>Fixes a heap OOB in <code>SdcaOptimizerV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37672">CVE-2021-37672</a>)</li> <li>Fixes a <code>CHECK</code>-fail in <code>MapStage</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37673">CVE-2021-37673</a>)</li> <li>Fixes a vulnerability arising from incomplete validation in <code>MaxPoolGrad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37674">CVE-2021-37674</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr in shape inference (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37676">CVE-2021-37676</a>)</li> <li>Fixes a division by 0 in most convolution operators (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37675">CVE-2021-37675</a>)</li> <li>Fixes vulnerabilities arising from missing validation in shape inference for <code>Dequantize</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37677">CVE-2021-37677</a>)</li> <li>Fixes an arbitrary code execution due to YAML deserialization (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37678">CVE-2021-37678</a>)</li> <li>Fixes a heap OOB in nested <code>tf.map_fn</code> with <code>RaggedTensor</code>s (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37679">CVE-2021-37679</a>)</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/blob/master/RELEASE.md">tensorflow's changelog</a>.</em></p> <blockquote> <h1>Release 2.5.1</h1> <p>This release introduces several vulnerability fixes:</p> <ul> <li>Fixes a heap out of bounds access in sparse reduction operations (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37635">CVE-2021-37635</a>)</li> <li>Fixes a floating point exception in <code>SparseDenseCwiseDiv</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37636">CVE-2021-37636</a>)</li> <li>Fixes a null pointer dereference in <code>CompressElement</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37637">CVE-2021-37637</a>)</li> <li>Fixes a null pointer dereference in <code>RaggedTensorToTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37638">CVE-2021-37638</a>)</li> <li>Fixes a null pointer dereference and a heap OOB read arising from operations restoring tensors (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37639">CVE-2021-37639</a>)</li> <li>Fixes an integer division by 0 in sparse reshaping (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37640">CVE-2021-37640</a>)</li> <li>Fixes a division by 0 in <code>ResourceScatterDiv</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37642">CVE-2021-37642</a>)</li> <li>Fixes a heap OOB in <code>RaggedGather</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37641">CVE-2021-37641</a>)</li> <li>Fixes a <code>std::abort</code> raised from <code>TensorListReserve</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37644">CVE-2021-37644</a>)</li> <li>Fixes a null pointer dereference in <code>MatrixDiagPartOp</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37643">CVE-2021-37643</a>)</li> <li>Fixes an integer overflow due to conversion to unsigned (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37645">CVE-2021-37645</a>)</li> <li>Fixes a bad allocation error in <code>StringNGrams</code> caused by integer conversion (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37646">CVE-2021-37646</a>)</li> <li>Fixes a null pointer dereference in <code>SparseTensorSliceDataset</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37647">CVE-2021-37647</a>)</li> <li>Fixes an incorrect validation of <code>SaveV2</code> inputs (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37648">CVE-2021-37648</a>)</li> <li>Fixes a null pointer dereference in <code>UncompressElement</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37649">CVE-2021-37649</a>)</li> <li>Fixes a segfault and a heap buffer overflow in <code>{Experimental,}DatasetToTFRecord</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37650">CVE-2021-37650</a>)</li> <li>Fixes a heap buffer overflow in <code>FractionalAvgPoolGrad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37651">CVE-2021-37651</a>)</li> <li>Fixes a use after free in boosted trees creation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37652">CVE-2021-37652</a>)</li> <li>Fixes a division by 0 in <code>ResourceGather</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37653">CVE-2021-37653</a>)</li> <li>Fixes a heap OOB and a <code>CHECK</code> fail in <code>ResourceGather</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37654">CVE-2021-37654</a>)</li> <li>Fixes a heap OOB in <code>ResourceScatterUpdate</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37655">CVE-2021-37655</a>)</li> <li>Fixes an undefined behavior arising from reference binding to nullptr in <code>RaggedTensorToSparse</code></li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/tensorflow/tensorflow/commit/8222c1cfc866126111f23bd9872998480cebf2c1"><code>8222c1c</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/51381">#51381</a> from tensorflow/mm-fix-r2.5-build</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/d5842603e03504d8ed30b0622e03869899c9f41d"><code>d584260</code></a> Disable broken/flaky test</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/f6c6ce30bab35320e5da6e25fbdd8c369de75ab7"><code>f6c6ce3</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/51367">#51367</a> from tensorflow-jenkins/version-numbers-2.5.1-17468</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/3ca781272c60959f3a24a2b440f2f275aab71a76"><code>3ca7812</code></a> Update version numbers to 2.5.1</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/4fdf683c878574bc2c39fe8ac152ffc26183efb6"><code>4fdf683</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/51361">#51361</a> from tensorflow/mm-update-relnotes-on-r2.5</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/05fc01aa0ffe973a2b1517bd92479e38f5d2c72a"><code>05fc01a</code></a> Put CVE numbers for fixes in parentheses</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/bee1dc4a6116b53101fc8773f43662a89514847d"><code>bee1dc4</code></a> Update release notes for the new patch release</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/47beb4c1987293659784d6aa1dfaacc86bc07d84"><code>47beb4c</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/50597">#50597</a> from kruglov-dmitry/v2.5.0-sync-abseil-cmake-bazel</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/6f39597952e230d2a782547380cdf8143bdcdc5d"><code>6f39597</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/49383">#49383</a> from ashahab/abin-load-segfault-r2.5</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/0539b34641ee0773f07d859fe69dc0dfc71069d3"><code>0539b34</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/48979">#48979</a> from liufengdb/r2.5-cherrypick</li> <li>Additional commits viewable in <a href="https://github.com/tensorflow/tensorflow/compare/v1.6.0...v2.5.1">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=tensorflow&package-manager=pip&previous-version=1.6.0&new-version=2.5.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/sjvasquez/handwriting-synthesis/network/alerts). </details>
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github/handwriting-synthesis#42
No description provided.