- 21 9月, 2022 2 次提交
-
-
由 Vamsi Krishna Manchala 提交于
This PR updates remainder of the TFLM examples, all the kernels and integration tests to remove the usage of ErrorReporter as per the changes made to the TFLM Framework API in https://github.com/tensorflow/tflite-micro/pull/1415; replaces TF_LITE_REPORT_ERROR with MicroPrintf. BUG=http://b/192091017, http://b/245802069
-
由 Vamsi Krishna Manchala 提交于
This PR updates some of the TFLM examples to remove the usage of ErrorReporter as per the changes made to the TFLM Framework API in https://github.com/tensorflow/tflite-micro/pull/1415; replaces TF_LITE_REPORT_ERROR with MicroPrintf. BUG=http://b/192091017, http://b/245802069
-
- 20 9月, 2022 4 次提交
-
-
由 TANMAY DAS 提交于
BUG=b/247598846
-
由 Renjie 提交于
Inference on a quantized model requires information about * input tensor quantization parameters (dtype, scale, zero point): to convert the input float data into the quantized one * output tensor quantization parameters: convert the quantized result back to float (i.e., sanity check with normal model output) This PR allows users to access these information from the python interpreter. It also refactored the error handling mechanism following TF and TFLite. BUG=b/245831075, b/246651364
-
由 TFLM-bot 提交于
-
由 Vamsi Krishna Manchala 提交于
This PR- 1. Changes the TFLite Micro Framework classes to eliminate the usage of `MicroErrorReporter` and `ErrorReporter` classes. 2. Keeps the version of the APIs, that expect ErrorReporter for backwards compatibility. - This compatibility is limited to the bare minimum set of API currently being used. - The minimum support to the version of API expecting ErrorReporter will be removed as a follow-up PR, expected to be merged next week. - Any new applications or examples using TFLM should no longer be creating and passing-in an ErrorReporter. BUG=http://b/245802069
-
- 16 9月, 2022 2 次提交
-
-
由 TANMAY DAS 提交于
This is a CL that allows us to build and run TFLM binaries from `tflite-micro` directory as well as from the parent directory of `tflite-micro`. Example : to run all the tests in TFLM from inside `tflite-micro` directory, we need to run the following command `make -f tensorflow/lite/micro/tools/make/Makefile test` Now to run the tests from the parent directory of `tflite-micro`, we need to run the following command `make -f tflite-micro/tensorflow/lite/micro/tools/make/Makefile test TENSORFLOW_ROOT=tflite-micro/` Please note that the '/' at the end of 'TENSORFLOW_ROOT=tflite-micro/' is mandatory. BUG=244204467
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
- 15 9月, 2022 2 次提交
-
-
由 Vamsi Krishna Manchala 提交于
This PR fixes some formatting errors in the online_memory_allocation_overview.md doc. BUG=http://b/242560771
-
由 Advait Jain 提交于
Chanced upon this while debugging why git push with a pre-push hook as described in https://github.com/tensorflow/tflite-micro/blob/main/CONTRIBUTING.md#initial-setup was failing. Root cause of the push failing was fixed with https://stackoverflow.com/q/60833006 but this cleanup is still useful. BUG=#1397
-
- 14 9月, 2022 1 次提交
-
-
由 Vamsi Krishna Manchala 提交于
This PR moves the `MicroPrintf` logging utility function to micro_log.h in an attempt to clean-up the message logging mechanism available for use today. BUG=http://b/245802069
-
- 11 9月, 2022 1 次提交
-
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
- 09 9月, 2022 3 次提交
-
-
由 Renjie 提交于
Google3 is not happy with the format and some bazel build dependency (Pillow). This PR fixes the python format and removed unnecessary dependency. BUG=cleanup
-
http://b/245773171由 Advait Jain 提交于
This PR fixes the issue for one particular target, but there are still others with the exact same error. The mako template is already correct as can be seen: https://github.com/tensorflow/tflite-micro/blob/87d2db744611937f5dfb818ef639b84370cffe44/tensorflow/lite/micro/integration_tests/templates/integration_tests_cc.mako#L52-L54 What this means is that many of the integration_tests.cc need to be regenerated with the updated mako template. Currently, we do not have an easy way to regenerate the integration_tests if all we have is a change to the mako template. Instead, we need to perform the full step of going from the model and regenerating all the tflite and golden input and output csvs. That is a problem and should be fixed. Additionally, the integration_test targets are currently cc_binary instead of cc_test which means that we do not have any CI coverage for them. We should revisit that decision as well. BUG=http://b/245773171
-
由 Renjie 提交于
# Evaluate trained LSTM model on MNIST dataset ## evaluate.py Given the trained .tflite model and a MNIST image path, output the predicted category (digit 0-9) probability. Example: `bazel build tensorflow/lite/micro/examples/mnist_lstm:evaluate` `bazel-bin/tensorflow/lite/micro/examples/mnist_lstm/evaluate --model_path='.tflite file path' --img_path='MNIST image path'` ## evaluate_test.py Test the evaluation code under the following criteria: * Using random input to compare results from TFLite interpreter's results * Using sample MNIST images to test model prediction accuracy Example: bazel test tensorflow/lite/micro/examples/mnist_lstm:evaluate_test ## Issues Xtensa implementation is out of dated and not tested. http://b/230666079 BUG=http://b/242765271 As a side benfeit, this PR also confirms support for LSTMs (reference floating point). Fixes #1243 and fixes #920
-
- 07 9月, 2022 1 次提交
-
-
由 Tom Bannink 提交于
This is the tflite-micro counterpart of https://github.com/tensorflow/tensorflow/pull/56493 and fixes a bug in int8 LSTM layers. See the tensorflow PR for a python snippet to reproduce the error, but switch the python lite interpreter to the python micro interpreter. BUG=http://b/245355939
-
- 03 9月, 2022 1 次提交
-
- 02 9月, 2022 2 次提交
-
-
由 Advait Jain 提交于
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
- 01 9月, 2022 6 次提交
-
-
-
由 rewu93 提交于
Some models such as LSTM are stateful, which requires state reset after each inference. This PR adds the model reset function, which has already been implemented in C++, into the TFLM python interpreter. BUG=http://b/244330968
-
由 Boyd Kane 提交于
This colab still had the old tensorflow/tensorflow github link for the tflite-micro examples. This PR fixes that link to the new (and working) tensorflow/tflite-micro github link. BUG=doc cleanup
-
由 David Davis 提交于
@tensorflow/micro Fix for project_generation TARGET_ARCH missing from cortex_m_generic makefile. This should resolve the current issue with the arduino-examples repo not syncing from the tflite-micro repo. bug=#1382
-
由 Advait Jain 提交于
BUG=244457206
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
- 31 8月, 2022 1 次提交
-
-
由 rewu93 提交于
BUG=http://b/242765271 # Train/save/convert LSTM model on MNIST dataset Using bazel: `bazel build tensorflow/lite/micro/examples/mnist_lstm:train` `bazel-bin/tensorflow/lite/micro/examples/mnist_lstm/train` ## Terminal arguments: * `--epoch` : number of epochs for model training, default 1 for fast trainning * `--save_dir`: the directory to save the trained model, default to `/tmp/trained_model`. * `--save_tf_model`: if specified, save the intermediate tensorflow model (debug usage) ## Example: `bazel build tensorflow/lite/micro/examples/mnist_lstm:train` `bazel-bin/tensorflow/lite/micro/examples/mnist_lstm/train --epoch=10 --save_dir=trained_model` Code above will train a simple LSTM model for MNIST digits recognition with 10 epochs. The trained model is converted to tflite flatbuffer format, and the .tflite file is saved to the trained_model folder in the source directory. Note the intermediate tensorflow model is not saved in this case (pass --save_tf_model=True to enable it).
-
- 30 8月, 2022 3 次提交
-
-
由 David Davis 提交于
@tensorflow/micro Fix TF model size reporting in train_hello_world_model.py script. Minor formatting fixes. bug=#1384
-
由 imcgraw 提交于
BUG=b/238904420
-
由 Steven Toribio 提交于
-
- 26 8月, 2022 3 次提交
-
-
由 suleshahid 提交于
This is to cleanup some code after the latest flatbuffer version update PR. * Update build targets in schema files to only have the original builds, :schema_fbs and :schema_py. * Fix checking in of schema in nightly sync. * Remove unneeded lines (of a deleted file) in copyright and license checks. Bugs: BUG= [243587789](https://buganizer.corp.google.com/issues/243587789) BUG= [243588297](https://buganizer.corp.google.com/issues/243588297) BUG= [243716132](https://buganizer.corp.google.com/issues/243716132)
-
由 Tom Bannink 提交于
This fixes two bugs in the recording micro allocator and one in the regular micro allocator, all related to models with multiple subgraphs. BUG=http://b/243820068
-
由 suleshahid 提交于
-
- 19 8月, 2022 1 次提交
-
-
由 Annie Tallund 提交于
We need to differentiate between the compiler used in the two CI tests Cortex-M and Cortex-M on Arm Virtual Hardware, which is what this fix does. Cortex-M uses gcc and AVH is for armclang. Related to BUG=#1305
-
- 18 8月, 2022 3 次提交
-
-
由 TANMAY DAS 提交于
BUG=b/199442906
-
由 TFLM-bot 提交于
BUG=automated sync from upstream NO_CHECK_TFLITE_FILES=automated sync from upstream
-
由 dependabot[bot] 提交于
Bumps [tensorflow](https://github.com/tensorflow/tensorflow) from 2.5.3 to 2.7.2. BUG=dependabot <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/releases">tensorflow's releases</a>.</em></p> <blockquote> <h2>TensorFlow 2.7.2</h2> <h1>Release 2.7.2</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a code injection in <code>saved_model_cli</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29216">CVE-2022-29216</a>)</li> <li>Fixes a missing validation which causes <code>TensorSummaryV2</code> to crash (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29193">CVE-2022-29193</a>)</li> <li>Fixes a missing validation which crashes <code>QuantizeAndDequantizeV4Grad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29192">CVE-2022-29192</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>DeleteSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29194">CVE-2022-29194</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>GetSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29191">CVE-2022-29191</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>StagePeek</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">CVE-2022-29195</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>UnsortedSegmentJoin</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29197">CVE-2022-29197</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LoadAndRemapMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29199">CVE-2022-29199</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>SparseTensorToCSRSparseMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29198">CVE-2022-29198</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LSTMBlockCell</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29200">CVE-2022-29200</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196">CVE-2022-29196</a>)</li> <li>Fixes a <code>CHECK</code> failure in depthwise ops via overflows (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41197">CVE-2021-41197</a>)</li> <li>Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29207">CVE-2022-29207</a>)</li> <li>Fixes a segfault due to missing support for quantized types (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29205">CVE-2022-29205</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>SparseTensorDenseAdd</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29206">CVE-2022-29206</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>QuantizedConv2D</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29201">CVE-2022-29201</a>)</li> <li>Fixes an integer overflow in <code>SpaceToBatchND</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29203">CVE-2022-29203</a>)</li> <li>Fixes a segfault and OOB write due to incomplete validation in <code>EditDistance</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29208">CVE-2022-29208</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29204">CVE-2022-29204</a>)</li> <li>Fixes a denial of service in <code>tf.ragged.constant</code> due to lack of validation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29202">CVE-2022-29202</a>)</li> <li>Fixes a segfault when <code>tf.histogram_fixed_width</code> is called with NaN values (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29211">CVE-2022-29211</a>)</li> <li>Fixes a core dump when loading TFLite models with quantization (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29212">CVE-2022-29212</a>)</li> <li>Fixes crashes stemming from incomplete validation in signal ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29213">CVE-2022-29213</a>)</li> <li>Fixes a type confusion leading to <code>CHECK</code>-failure based denial of service (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29209">CVE-2022-29209</a>)</li> <li>Updates <code>curl</code> to <code>7.83.1</code> to handle (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-22576">CVE-2022-22576</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27774">CVE-2022-27774</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27775">CVE-2022-27775</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27776">CVE-2022-27776</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27778">CVE-2022-27778</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27779">CVE-2022-27779</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27780">CVE-2022-27780</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27781">CVE-2022-27781</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27782">CVE-2022-27782</a> and (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-30115">CVE-2022-30115</a></li> <li>Updates <code>zlib</code> to <code>1.2.12</code> after <code>1.2.11</code> was pulled due to <a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">security issue</a></li> </ul> <h2>TensorFlow 2.7.1</h2> <h1>Release 2.7.1</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a floating point division by 0 when executing convolution operators (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21725">CVE-2022-21725</a>)</li> <li>Fixes a heap OOB read in shape inference for <code>ReverseSequence</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21728">CVE-2022-21728</a>)</li> <li>Fixes a heap OOB access in <code>Dequantize</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21726">CVE-2022-21726</a>)</li> <li>Fixes an integer overflow in shape inference for <code>Dequantize</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21727">CVE-2022-21727</a>)</li> <li>Fixes a heap OOB access in <code>FractionalAvgPoolGrad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21730">CVE-2022-21730</a>)</li> <li>Fixes an overflow and divide by zero in <code>UnravelIndex</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21729">CVE-2022-21729</a>)</li> <li>Fixes a type confusion in shape inference for <code>ConcatV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21731">CVE-2022-21731</a>)</li> <li>Fixes an OOM in <code>ThreadPoolHandle</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21732">CVE-2022-21732</a>)</li> <li>Fixes an OOM due to integer overflow in <code>StringNGrams</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21733">CVE-2022-21733</a>)</li> <li>Fixes more issues caused by incomplete validation in boosted trees code (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41208">CVE-2021-41208</a>)</li> <li>Fixes an integer overflows in most sparse component-wise ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23567">CVE-2022-23567</a>)</li> <li>Fixes an integer overflows in <code>AddManySparseToTensorsMap</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23568">CVE-2022-23568</a>)</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/tensorflow/tensorflow/blob/master/RELEASE.md">tensorflow's changelog</a>.</em></p> <blockquote> <h1>Release 2.7.2</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a code injection in <code>saved_model_cli</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29216">CVE-2022-29216</a>)</li> <li>Fixes a missing validation which causes <code>TensorSummaryV2</code> to crash (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29193">CVE-2022-29193</a>)</li> <li>Fixes a missing validation which crashes <code>QuantizeAndDequantizeV4Grad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29192">CVE-2022-29192</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>DeleteSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29194">CVE-2022-29194</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>GetSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29191">CVE-2022-29191</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>StagePeek</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">CVE-2022-29195</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>UnsortedSegmentJoin</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29197">CVE-2022-29197</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LoadAndRemapMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29199">CVE-2022-29199</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>SparseTensorToCSRSparseMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29198">CVE-2022-29198</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LSTMBlockCell</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29200">CVE-2022-29200</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196">CVE-2022-29196</a>)</li> <li>Fixes a <code>CHECK</code> failure in depthwise ops via overflows (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41197">CVE-2021-41197</a>)</li> <li>Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29207">CVE-2022-29207</a>)</li> <li>Fixes a segfault due to missing support for quantized types (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29205">CVE-2022-29205</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>SparseTensorDenseAdd</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29206">CVE-2022-29206</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>QuantizedConv2D</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29201">CVE-2022-29201</a>)</li> <li>Fixes an integer overflow in <code>SpaceToBatchND</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29203">CVE-2022-29203</a>)</li> <li>Fixes a segfault and OOB write due to incomplete validation in <code>EditDistance</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29208">CVE-2022-29208</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29204">CVE-2022-29204</a>)</li> <li>Fixes a denial of service in <code>tf.ragged.constant</code> due to lack of validation (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29202">CVE-2022-29202</a>)</li> <li>Fixes a segfault when <code>tf.histogram_fixed_width</code> is called with NaN values (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29211">CVE-2022-29211</a>)</li> <li>Fixes a core dump when loading TFLite models with quantization (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29212">CVE-2022-29212</a>)</li> <li>Fixes crashes stemming from incomplete validation in signal ops (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29213">CVE-2022-29213</a>)</li> <li>Fixes a type confusion leading to <code>CHECK</code>-failure based denial of service (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29209">CVE-2022-29209</a>)</li> <li>Updates <code>curl</code> to <code>7.83.1</code> to handle (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-22576">CVE-2022-22576</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27774">CVE-2022-27774</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27775">CVE-2022-27775</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27776">CVE-2022-27776</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27778">CVE-2022-27778</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27779">CVE-2022-27779</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27780">CVE-2022-27780</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27781">CVE-2022-27781</a>, (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-27782">CVE-2022-27782</a> and (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=VE-2022-30115">CVE-2022-30115</a></li> <li>Updates <code>zlib</code> to <code>1.2.12</code> after <code>1.2.11</code> was pulled due to <a href="https://www.openwall.com/lists/oss-security/2022/03/28/1">security issue</a></li> </ul> <h1>Release 2.6.4</h1> <p>This releases introduces several vulnerability fixes:</p> <ul> <li>Fixes a code injection in <code>saved_model_cli</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29216">CVE-2022-29216</a>)</li> <li>Fixes a missing validation which causes <code>TensorSummaryV2</code> to crash (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29193">CVE-2022-29193</a>)</li> <li>Fixes a missing validation which crashes <code>QuantizeAndDequantizeV4Grad</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29192">CVE-2022-29192</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>DeleteSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29194">CVE-2022-29194</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>GetSessionTensor</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29191">CVE-2022-29191</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>StagePeek</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29195">CVE-2022-29195</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>UnsortedSegmentJoin</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29197">CVE-2022-29197</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LoadAndRemapMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29199">CVE-2022-29199</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>SparseTensorToCSRSparseMatrix</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29198">CVE-2022-29198</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>LSTMBlockCell</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29200">CVE-2022-29200</a>)</li> <li>Fixes a missing validation which causes denial of service via <code>Conv3DBackpropFilterV2</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29196">CVE-2022-29196</a>)</li> <li>Fixes a <code>CHECK</code> failure in depthwise ops via overflows (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41197">CVE-2021-41197</a>)</li> <li>Fixes issues arising from undefined behavior stemming from users supplying invalid resource handles (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29207">CVE-2022-29207</a>)</li> <li>Fixes a segfault due to missing support for quantized types (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29205">CVE-2022-29205</a>)</li> <li>Fixes a missing validation which results in undefined behavior in <code>SparseTensorDenseAdd</code> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29206">CVE-2022-29206</a>)</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/tensorflow/tensorflow/commit/dd7b8a3c1714d0052ce4b4a2fd8dcef927439a24"><code>dd7b8a3</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56034">#56034</a> from tensorflow-jenkins/relnotes-2.7.2-15779</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/1e7d6ea26dec19c8be5a67bdb4fa574a69f3da86"><code>1e7d6ea</code></a> Update RELEASE.md</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/50851350cbafeb82d8edc91cc9974b20db257bab"><code>5085135</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56069">#56069</a> from tensorflow/mm-cp-52488e5072f6fe44411d70c6af09e...</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/adafb45c7812dac1e84d4f23524106ba45d441c2"><code>adafb45</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56060">#56060</a> from yongtang:curl-7.83.1</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/01cb1b8bb061c40a7b7b0f632235439ac7ba981e"><code>01cb1b8</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56038">#56038</a> from tensorflow-jenkins/version-numbers-2.7.2-4733</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/8c90c2fa07e4376f032a425d863ef11ce357e3c5"><code>8c90c2f</code></a> Update version numbers to 2.7.2</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/43f3cdc95f4dc6ea9f6979cdb82005b79103f591"><code>43f3cdc</code></a> Update RELEASE.md</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/98b0a48e852364f17f5f3b4b6525d8c3efd0e73d"><code>98b0a48</code></a> Insert release notes place-fill</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/dfa5cf382323f0d3ffb4d96477d9d2fbd7d48abb"><code>dfa5cf3</code></a> Merge pull request <a href="https://github-redirect.dependabot.com/tensorflow/tensorflow/issues/56028">#56028</a> from tensorflow/disable-tests-on-r2.7</li> <li><a href="https://github.com/tensorflow/tensorflow/commit/501a65c3469bfeafb508c97db0654ad694460167"><code>501a65c</code></a> Disable timing out tests</li> <li>Additional commits viewable in <a href="https://github.com/tensorflow/tensorflow/compare/v2.5.3...v2.7.2">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=tensorflow&package-manager=pip&previous-version=2.5.3&new-version=2.7.2)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/tensorflow/tflite-micro/network/alerts). </details>
-
- 17 8月, 2022 3 次提交
-
-
由 imcgraw 提交于
BUG=http://b/238904420
-
由 Måns Nilsson 提交于
BUG=fixes https://github.com/tensorflow/tflite-micro/issues/1356
-
-
- 16 8月, 2022 1 次提交
-
-
由 Advait Jain 提交于
BUG=http://b/238904420 NO_CHECK_TFLITE_FILES=manual sync after updating file list.
-