#adventOfCode
Bumps [tensorflow](https://github.com/tensorflow/tensorflow) from 2.0.0 to 2.0.3. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/releases">tensorflow's releases</a>.</em></p> <blockquote> <h2>TensorFlow 2.0.3</h2> <h1>Release 2.0.3</h1> <h2>Bug Fixes and Other Changes</h2> <ul> <li>Fixes an undefined behavior causing a segfault in <code>tf.raw_ops.Switch</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15190">CVE-2020-15190</a>)</li> <li>Fixes three vulnerabilities in conversion to DLPack format (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15191">CVE-2020-15191</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15192">CVE-2020-15192</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15193">CVE-2020-15193</a>)</li> <li>Fixes two vulnerabilities in <code>SparseFillEmptyRowsGrad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15194">CVE-2020-15194</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15195">CVE-2020-15195</a>)</li> <li>Fixes an integer truncation vulnerability in code using the work sharder API (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15202">CVE-2020-15202</a>)</li> <li>Fixes a format string vulnerability in <code>tf.strings.as_string</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15203">CVE-2020-15203</a>)</li> <li>Fixes segfault raised by calling session-only ops in eager mode (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15204">CVE-2020-15204</a>)</li> <li>Fixes data leak and potential ASLR violation from <code>tf.raw_ops.StringNGrams</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15205">CVE-2020-15205</a>)</li> <li>Fixes segfaults caused by incomplete <code>SavedModel</code> validation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15206">CVE-2020-15206</a>)</li> <li>Fixes a data corruption due to a bug in negative indexing support in TFLite (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15207">CVE-2020-15207</a>)</li> <li>Fixes a data corruption due to dimension mismatch in TFLite (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15208">CVE-2020-15208</a>)</li> <li>Fixes several vulnerabilities in TFLite saved model format (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15209">CVE-2020-15209</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15210">CVE-2020-15210</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15211">CVE-2020-15211</a>)</li> <li>Updates <code>sqlite3</code> to <code>3.33.00</code> to handle <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327">CVE-2020-9327</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655">CVE-2020-11655</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656">CVE-2020-11656</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434">CVE-2020-13434</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435">CVE-2020-13435</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630">CVE-2020-13630</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631">CVE-2020-13631</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871">CVE-2020-13871</a>, and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358">CVE-2020-15358</a>.</li> <li>Pins <code>numpy</code> to 1.18.5 to prevent ABI breakage when compiling code that uses both NumPy and TensorFlow headers.</li> </ul> <h2>TensorFlow 2.0.2</h2> <h2>Bug Fixes and Other Changes</h2> <ul> <li>Updates <code>sqlite3</code> to <code>3.31.01</code> to handle <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880">CVE-2019-19880</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244">CVE-2019-19244</a> and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645">CVE-2019-19645</a></li> <li>Updates <code>curl</code> to <code>7.69.1</code> to handle <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15601">CVE-2019-15601</a></li> <li>Updates <code>libjpeg-turbo</code> to <code>2.0.4</code> to handle <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19664">CVE-2018-19664</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20330">CVE-2018-20330</a> and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13960">CVE-2019-13960</a></li> <li>Updates Apache Spark to <code>2.4.5</code> to handle <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10099">CVE-2019-10099</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17190">CVE-2018-17190</a> and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11770">CVE-2018-11770</a></li> </ul> <h2>TensorFlow 2.0.1</h2> <h1>Release 2.0.1</h1> <h2>Bug Fixes and Other Changes</h2> <ul> <li>Fixes a security vulnerability where converting a Python string to a <code>tf.float16</code> value produces a segmentation fault (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5215">CVE-2020-5215</a>)</li> <li>Updates <code>curl</code> to <code>7.66.0</code> to handle <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482">CVE-2019-5482</a> and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481">CVE-2019-5481</a></li> <li>Updates <code>sqlite3</code> to <code>3.30.01</code> to handle <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19646">CVE-2019-19646</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645">CVE-2019-19645</a> and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168">CVE-2019-16168</a></li> </ul> </blockquote> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/blob/master/RELEASE.md">tensorflow's changelog</a>.</em></p> <blockquote> <h1>Release 2.0.3</h1> <h2>Bug Fixes and Other Changes</h2> <ul> <li>Fixes an undefined behavior causing a segfault in <code>tf.raw_ops.Switch</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15190">CVE-2020-15190</a>)</li> <li>Fixes three vulnerabilities in conversion to DLPack format (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15191">CVE-2020-15191</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15192">CVE-2020-15192</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15193">CVE-2020-15193</a>)</li> <li>Fixes two vulnerabilities in <code>SparseFillEmptyRowsGrad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15194">CVE-2020-15194</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15195">CVE-2020-15195</a>)</li> <li>Fixes an integer truncation vulnerability in code using the work sharder API (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15202">CVE-2020-15202</a>)</li> <li>Fixes a format string vulnerability in <code>tf.strings.as_string</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15203">CVE-2020-15203</a>)</li> <li>Fixes segfault raised by calling session-only ops in eager mode (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15204">CVE-2020-15204</a>)</li> <li>Fixes data leak and potential ASLR violation from <code>tf.raw_ops.StringNGrams</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15205">CVE-2020-15205</a>)</li> <li>Fixes segfaults caused by incomplete <code>SavedModel</code> validation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15206">CVE-2020-15206</a>)</li> <li>Fixes a data corruption due to a bug in negative indexing support in TFLite (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15207">CVE-2020-15207</a>)</li> <li>Fixes a data corruption due to dimension mismatch in TFLite (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15208">CVE-2020-15208</a>)</li> <li>Fixes several vulnerabilities in TFLite saved model format (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15209">CVE-2020-15209</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15210">CVE-2020-15210</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15211">CVE-2020-15211</a>)</li> <li>Updates <code>sqlite3</code> to <code>3.33.00</code> to handle <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327">CVE-2020-9327</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655">CVE-2020-11655</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656">CVE-2020-11656</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434">CVE-2020-13434</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435">CVE-2020-13435</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630">CVE-2020-13630</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631">CVE-2020-13631</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871">CVE-2020-13871</a>, and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358">CVE-2020-15358</a>.</li> <li>Pins <code>numpy</code> to 1.18.5 to prevent ABI breakage when compiling code that uses both NumPy and TensorFlow headers.</li> </ul> <h1>Release 1.15.4</h1> <h2>Bug Fixes and Other Changes</h2> <ul> <li>Fixes an undefined behavior causing a segfault in <code>tf.raw_ops.Switch</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15190">CVE-2020-15190</a>)</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/tensorflow/tensorflow/commit/295ad2781683835be974faba0a191528d8079768"><code>295ad27</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/43443">#43443</a> from tensorflow-jenkins/version-numbers-2.0.3-23981</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/c574e641ffb652b34bd918cbc7c3ba681e2d72af"><code>c574e64</code></a> Update version numbers to 2.0.3</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/1bdd956e630fef49d2ec14f1747704ac13df740b"><code>1bdd956</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/43438">#43438</a> from tensorflow-jenkins/relnotes-2.0.3-26591</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/60f0b7b1dbf28e8922508e5e23e606a6a80b30c4"><code>60f0b7b</code></a> Update RELEASE.md</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/e081967f1df8fcfeb34bae829df62eb1b26a0b10"><code>e081967</code></a> Insert release notes place-fill</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/975a52309c366b3ed34aa5da63be29f15668d884"><code>975a523</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/43411">#43411</a> from tensorflow/mm-fix-2.0</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/0ea1b845d86ccc98ea74dadb8f76efcad4fd69a7"><code>0ea1b84</code></a> Add missing import</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/b98dc690f1a9691a823357f7f59cc42aa184af0f"><code>b98dc69</code></a> No <code>disable_tfrt</code> present on this branch</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/4ec48a161faf954ddc301cc27ee31a4f8baaeb9e"><code>4ec48a1</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/43407">#43407</a> from tensorflow/mihaimaruseac-patch-2</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/c55d0c3008eabcd0548325e16a9c8df3a22bae40"><code>c55d0c3</code></a> Remove import that is not needed</li> <li>Additional commits viewable in <a href="https://github.com/tensorflow/tensorflow/compare/v2.0.0...v2.0.3">compare view</a></li> </ul> </details> <br /> [](https://docs.github.com/en/github/managing-security-vulnerabilities/configuring-github-dependabot-security-updates) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/zedrdave/advent_of_code/network/alerts). </details>
This issue appears to be discussing a feature request or bug report related to the repository. Based on the content, it seems to be resolved. The issue was opened by dependabot[bot] and has received 1 comments.