From 809fa9f8d47050734d8d044ca837f640ae119482 Mon Sep 17 00:00:00 2001 From: TensorFlow Release Automation Date: Wed, 15 Jan 2020 13:59:20 -0800 Subject: [PATCH 1/3] Insert release notes place-fill --- RELEASE.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/RELEASE.md b/RELEASE.md index 46c7af892a9b74..dd93033033d34b 100644 --- a/RELEASE.md +++ b/RELEASE.md @@ -1,3 +1,7 @@ +# Release 2.0.1 + + + # Release 2.0.0 ## Major Features and Improvements From bedfb3999ffdc1c353bf83fbe9e6002598484c63 Mon Sep 17 00:00:00 2001 From: Mihai Maruseac Date: Sat, 18 Jan 2020 14:52:35 -0800 Subject: [PATCH 2/3] Update RELEASE.md --- RELEASE.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/RELEASE.md b/RELEASE.md index dd93033033d34b..22badfef17742c 100644 --- a/RELEASE.md +++ b/RELEASE.md @@ -1,6 +1,10 @@ # Release 2.0.1 - +## Bug Fixes and Other Changes +* Fixes a security vulnerability where converting a Python string to a `tf.float16` value produces a segmentation fault +* Updates `curl` to `7.66.0` to handle [CVE-2019-5482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482) and [CVE-2019-5481](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481) +* Updates `sqlite3` to `3.30.01` to handle [CVE-2019-19646](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19646), [CVE-2019-19645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645) and [CVE-2019-16168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168) + # Release 2.0.0 From 0bcb99b37577332ba7ee3f7dd06a4ac4801d3ec2 Mon Sep 17 00:00:00 2001 From: Mihai Maruseac Date: Tue, 21 Jan 2020 17:12:22 -0800 Subject: [PATCH 3/3] Add CVE number for main patch --- RELEASE.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/RELEASE.md b/RELEASE.md index 22badfef17742c..0d1af5708ae8b5 100644 --- a/RELEASE.md +++ b/RELEASE.md @@ -1,7 +1,7 @@ # Release 2.0.1 ## Bug Fixes and Other Changes -* Fixes a security vulnerability where converting a Python string to a `tf.float16` value produces a segmentation fault +* Fixes a security vulnerability where converting a Python string to a `tf.float16` value produces a segmentation fault ([CVE-2020-5215](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5215)) * Updates `curl` to `7.66.0` to handle [CVE-2019-5482](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482) and [CVE-2019-5481](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481) * Updates `sqlite3` to `3.30.01` to handle [CVE-2019-19646](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19646), [CVE-2019-19645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645) and [CVE-2019-16168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168)