dependabot[bot] opened a new pull request #15428:
URL: https://github.com/apache/beam/pull/15428


   Bumps [tensorflow](https://github.com/tensorflow/tensorflow) from 2.5.0 to 
2.5.1.
   <details>
   <summary>Release notes</summary>
   <p><em>Sourced from <a 
href="https://github.com/tensorflow/tensorflow/releases";>tensorflow's 
releases</a>.</em></p>
   <blockquote>
   <h2>TensorFlow 2.5.1</h2>
   <h1>Release 2.5.1</h1>
   <p>This release introduces several vulnerability fixes:</p>
   <ul>
   <li>Fixes a heap out of bounds access in sparse reduction operations (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37635";>CVE-2021-37635</a>)</li>
   <li>Fixes a floating point exception in <code>SparseDenseCwiseDiv</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37636";>CVE-2021-37636</a>)</li>
   <li>Fixes a null pointer dereference in <code>CompressElement</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37637";>CVE-2021-37637</a>)</li>
   <li>Fixes a null pointer dereference in <code>RaggedTensorToTensor</code> 
(<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37638";>CVE-2021-37638</a>)</li>
   <li>Fixes a null pointer dereference and a heap OOB read arising from 
operations restoring tensors (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37639";>CVE-2021-37639</a>)</li>
   <li>Fixes an integer division by 0 in sparse reshaping (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37640";>CVE-2021-37640</a>)</li>
   <li>Fixes a division by 0 in <code>ResourceScatterDiv</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37642";>CVE-2021-37642</a>)</li>
   <li>Fixes a heap OOB in <code>RaggedGather</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37641";>CVE-2021-37641</a>)</li>
   <li>Fixes a <code>std::abort</code> raised from 
<code>TensorListReserve</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37644";>CVE-2021-37644</a>)</li>
   <li>Fixes a null pointer dereference in <code>MatrixDiagPartOp</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37643";>CVE-2021-37643</a>)</li>
   <li>Fixes an integer overflow due to conversion to unsigned (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37645";>CVE-2021-37645</a>)</li>
   <li>Fixes a bad allocation error in <code>StringNGrams</code> caused by 
integer conversion (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37646";>CVE-2021-37646</a>)</li>
   <li>Fixes a null pointer dereference in 
<code>SparseTensorSliceDataset</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37647";>CVE-2021-37647</a>)</li>
   <li>Fixes an incorrect validation of <code>SaveV2</code> inputs (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37648";>CVE-2021-37648</a>)</li>
   <li>Fixes a null pointer dereference in <code>UncompressElement</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37649";>CVE-2021-37649</a>)</li>
   <li>Fixes a segfault and a heap buffer overflow in 
<code>{Experimental,}DatasetToTFRecord</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37650";>CVE-2021-37650</a>)</li>
   <li>Fixes a heap buffer overflow in <code>FractionalAvgPoolGrad</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37651";>CVE-2021-37651</a>)</li>
   <li>Fixes a use after free in boosted trees creation (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37652";>CVE-2021-37652</a>)</li>
   <li>Fixes a division by 0 in <code>ResourceGather</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37653";>CVE-2021-37653</a>)</li>
   <li>Fixes a heap OOB and a <code>CHECK</code> fail in 
<code>ResourceGather</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37654";>CVE-2021-37654</a>)</li>
   <li>Fixes a heap OOB in <code>ResourceScatterUpdate</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37655";>CVE-2021-37655</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr in 
<code>RaggedTensorToSparse</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37656";>CVE-2021-37656</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr in 
<code>MatrixDiagV*</code> ops (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37657";>CVE-2021-37657</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr in 
<code>MatrixSetDiagV*</code> ops (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37658";>CVE-2021-37658</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr 
and heap OOB in binary cwise ops (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37659";>CVE-2021-37659</a>)</li>
   <li>Fixes a division by 0 in inplace operations (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37660";>CVE-2021-37660</a>)</li>
   <li>Fixes a crash caused by integer conversion to unsigned (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37661";>CVE-2021-37661</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr in 
boosted trees (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37662";>CVE-2021-37662</a>)</li>
   <li>Fixes a heap OOB in boosted trees (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37664";>CVE-2021-37664</a>)</li>
   <li>Fixes vulnerabilities arising from incomplete validation in 
<code>QuantizeV2</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37663";>CVE-2021-37663</a>)</li>
   <li>Fixes vulnerabilities arising from incomplete validation in MKL 
requantization (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37665";>CVE-2021-37665</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr in 
<code>RaggedTensorToVariant</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37666";>CVE-2021-37666</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr in 
unicode encoding (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37667";>CVE-2021-37667</a>)</li>
   <li>Fixes an FPE in <code>tf.raw_ops.UnravelIndex</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37668";>CVE-2021-37668</a>)</li>
   <li>Fixes a crash in NMS ops caused by integer conversion to unsigned (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37669";>CVE-2021-37669</a>)</li>
   <li>Fixes a heap OOB in <code>UpperBound</code> and <code>LowerBound</code> 
(<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37670";>CVE-2021-37670</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr in 
map operations (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37671";>CVE-2021-37671</a>)</li>
   <li>Fixes a heap OOB in <code>SdcaOptimizerV2</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37672";>CVE-2021-37672</a>)</li>
   <li>Fixes a <code>CHECK</code>-fail in <code>MapStage</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37673";>CVE-2021-37673</a>)</li>
   <li>Fixes a vulnerability arising from incomplete validation in 
<code>MaxPoolGrad</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37674";>CVE-2021-37674</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr in 
shape inference (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37676";>CVE-2021-37676</a>)</li>
   <li>Fixes a division by 0 in most convolution operators (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37675";>CVE-2021-37675</a>)</li>
   <li>Fixes vulnerabilities arising from missing validation in shape inference 
for <code>Dequantize</code> (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37677";>CVE-2021-37677</a>)</li>
   <li>Fixes an arbitrary code execution due to YAML deserialization (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37678";>CVE-2021-37678</a>)</li>
   <li>Fixes a heap OOB in nested <code>tf.map_fn</code> with 
<code>RaggedTensor</code>s (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37679";>CVE-2021-37679</a>)</li>
   </ul>
   <!-- raw HTML omitted -->
   </blockquote>
   <p>... (truncated)</p>
   </details>
   <details>
   <summary>Changelog</summary>
   <p><em>Sourced from <a 
href="https://github.com/tensorflow/tensorflow/blob/master/RELEASE.md";>tensorflow's
 changelog</a>.</em></p>
   <blockquote>
   <h1>Release 2.5.1</h1>
   <p>This release introduces several vulnerability fixes:</p>
   <ul>
   <li>Fixes a heap out of bounds access in sparse reduction operations
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37635";>CVE-2021-37635</a>)</li>
   <li>Fixes a floating point exception in <code>SparseDenseCwiseDiv</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37636";>CVE-2021-37636</a>)</li>
   <li>Fixes a null pointer dereference in <code>CompressElement</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37637";>CVE-2021-37637</a>)</li>
   <li>Fixes a null pointer dereference in <code>RaggedTensorToTensor</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37638";>CVE-2021-37638</a>)</li>
   <li>Fixes a null pointer dereference and a heap OOB read arising from 
operations
   restoring tensors
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37639";>CVE-2021-37639</a>)</li>
   <li>Fixes an integer division by 0 in sparse reshaping
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37640";>CVE-2021-37640</a>)</li>
   <li>Fixes a division by 0 in <code>ResourceScatterDiv</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37642";>CVE-2021-37642</a>)</li>
   <li>Fixes a heap OOB in <code>RaggedGather</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37641";>CVE-2021-37641</a>)</li>
   <li>Fixes a <code>std::abort</code> raised from 
<code>TensorListReserve</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37644";>CVE-2021-37644</a>)</li>
   <li>Fixes a null pointer dereference in <code>MatrixDiagPartOp</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37643";>CVE-2021-37643</a>)</li>
   <li>Fixes an integer overflow due to conversion to unsigned
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37645";>CVE-2021-37645</a>)</li>
   <li>Fixes a bad allocation error in <code>StringNGrams</code> caused by 
integer conversion
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37646";>CVE-2021-37646</a>)</li>
   <li>Fixes a null pointer dereference in <code>SparseTensorSliceDataset</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37647";>CVE-2021-37647</a>)</li>
   <li>Fixes an incorrect validation of <code>SaveV2</code> inputs
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37648";>CVE-2021-37648</a>)</li>
   <li>Fixes a null pointer dereference in <code>UncompressElement</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37649";>CVE-2021-37649</a>)</li>
   <li>Fixes a segfault and a heap buffer overflow in
   <code>{Experimental,}DatasetToTFRecord</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37650";>CVE-2021-37650</a>)</li>
   <li>Fixes a heap buffer overflow in <code>FractionalAvgPoolGrad</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37651";>CVE-2021-37651</a>)</li>
   <li>Fixes a use after free in boosted trees creation
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37652";>CVE-2021-37652</a>)</li>
   <li>Fixes a division by 0 in <code>ResourceGather</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37653";>CVE-2021-37653</a>)</li>
   <li>Fixes a heap OOB and a <code>CHECK</code> fail in 
<code>ResourceGather</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37654";>CVE-2021-37654</a>)</li>
   <li>Fixes a heap OOB in <code>ResourceScatterUpdate</code>
   (<a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37655";>CVE-2021-37655</a>)</li>
   <li>Fixes an undefined behavior arising from reference binding to nullptr in
   <code>RaggedTensorToSparse</code></li>
   </ul>
   <!-- raw HTML omitted -->
   </blockquote>
   <p>... (truncated)</p>
   </details>
   <details>
   <summary>Commits</summary>
   <ul>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/8222c1cfc866126111f23bd9872998480cebf2c1";><code>8222c1c</code></a>
 Merge pull request <a 
href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/51381";>#51381</a>
 from tensorflow/mm-fix-r2.5-build</li>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/d5842603e03504d8ed30b0622e03869899c9f41d";><code>d584260</code></a>
 Disable broken/flaky test</li>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/f6c6ce30bab35320e5da6e25fbdd8c369de75ab7";><code>f6c6ce3</code></a>
 Merge pull request <a 
href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/51367";>#51367</a>
 from tensorflow-jenkins/version-numbers-2.5.1-17468</li>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/3ca781272c60959f3a24a2b440f2f275aab71a76";><code>3ca7812</code></a>
 Update version numbers to 2.5.1</li>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/4fdf683c878574bc2c39fe8ac152ffc26183efb6";><code>4fdf683</code></a>
 Merge pull request <a 
href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/51361";>#51361</a>
 from tensorflow/mm-update-relnotes-on-r2.5</li>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/05fc01aa0ffe973a2b1517bd92479e38f5d2c72a";><code>05fc01a</code></a>
 Put CVE numbers for fixes in parentheses</li>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/bee1dc4a6116b53101fc8773f43662a89514847d";><code>bee1dc4</code></a>
 Update release notes for the new patch release</li>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/47beb4c1987293659784d6aa1dfaacc86bc07d84";><code>47beb4c</code></a>
 Merge pull request <a 
href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/50597";>#50597</a>
 from kruglov-dmitry/v2.5.0-sync-abseil-cmake-bazel</li>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/6f39597952e230d2a782547380cdf8143bdcdc5d";><code>6f39597</code></a>
 Merge pull request <a 
href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/49383";>#49383</a>
 from ashahab/abin-load-segfault-r2.5</li>
   <li><a 
href="https://github.com/tensorflow/tensorflow/commit/0539b34641ee0773f07d859fe69dc0dfc71069d3";><code>0539b34</code></a>
 Merge pull request <a 
href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/48979";>#48979</a>
 from liufengdb/r2.5-cherrypick</li>
   <li>Additional commits viewable in <a 
href="https://github.com/tensorflow/tensorflow/compare/v2.5.0...v2.5.1";>compare 
view</a></li>
   </ul>
   </details>
   <br />
   
   
   [![Dependabot compatibility 
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=tensorflow&package-manager=pip&previous-version=2.5.0&new-version=2.5.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)
   
   Dependabot will resolve any conflicts with this PR as long as you don't 
alter it yourself. You can also trigger a rebase manually by commenting 
`@dependabot rebase`.
   
   [//]: # (dependabot-automerge-start)
   [//]: # (dependabot-automerge-end)
   
   ---
   
   <details>
   <summary>Dependabot commands and options</summary>
   <br />
   
   You can trigger Dependabot actions by commenting on this PR:
   - `@dependabot rebase` will rebase this PR
   - `@dependabot recreate` will recreate this PR, overwriting any edits that 
have been made to it
   - `@dependabot merge` will merge this PR after your CI passes on it
   - `@dependabot squash and merge` will squash and merge this PR after your CI 
passes on it
   - `@dependabot cancel merge` will cancel a previously requested merge and 
block automerging
   - `@dependabot reopen` will reopen this PR if it is closed
   - `@dependabot close` will close this PR and stop Dependabot recreating it. 
You can achieve the same result by closing it manually
   - `@dependabot ignore this major version` will close this PR and stop 
Dependabot creating any more for this major version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this minor version` will close this PR and stop 
Dependabot creating any more for this minor version (unless you reopen the PR 
or upgrade to it yourself)
   - `@dependabot ignore this dependency` will close this PR and stop 
Dependabot creating any more for this dependency (unless you reopen the PR or 
upgrade to it yourself)
   - `@dependabot use these labels` will set the current labels as the default 
for future PRs for this repo and language
   - `@dependabot use these reviewers` will set the current reviewers as the 
default for future PRs for this repo and language
   - `@dependabot use these assignees` will set the current assignees as the 
default for future PRs for this repo and language
   - `@dependabot use this milestone` will set the current milestone as the 
default for future PRs for this repo and language
   
   You can disable automated security fix PRs for this repo from the [Security 
Alerts page](https://github.com/apache/beam/network/alerts).
   
   </details>


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to