You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 17, 2023. It is now read-only.
Based on these bugfixes, we would like to release a 1.9.1 patch release. If there are any outstanding bugfixes or improvements that you would like to see included, please respond to this thread immediately.
We would like to tag the release on Friday, April 15th, 2022, so any changes should be merged by then.
The text was updated successfully, but these errors were encountered:
On Tue, Apr 12, 2022 at 12:05 PM waytrue17 ***@***.***> wrote:
Problem statement
Dear MXNet community,
After the v1.9.0 release, there are many important bug fixes merged into
v1.9.x branch. For example:
- Fix CPP package build when large tensor support enabled #20841
<#20841>,
- Fix security vulnerability in RTC code #20840
<#20840>,
- Fix identity fuse for oneDNN in large graph #20884
<#20884>,
- Fix accuracy issue due to reuse of primitives for MKLDNN-AArch64
#20921 <#20921>,
- Fix sporadic crash issue when closing MXNet #20944
<#20944>,
- Fix security vulnerabilities affecting numpy<1.19.1 #20940
<#20940>,
- Upgrade oneDNN to fix slim convolutions weight issue #20994
<#20994>
Based on these bugfixes, we would like to release a 1.9.1 patch release.
If there are any outstanding bugfixes or improvements that you would like
to see included, please respond to this thread immediately.
—
Reply to this email directly, view it on GitHub
<#21000>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABAIYJZH74ZRGP2KXEQFYXLVEXCQ3ANCNFSM5TIIA7BQ>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
Hi there,
I am a security researcher and I have found a DMARC vulnerability which I
reported from this attack. An attacker can spam your users by sending them
email using your website's official email address, kindly forward this to
the development team.
hoping for a bounty for my ethical disclosure of this vulnerability to you.
Waiting for your response.
Always Best Regards
Arslan
On Thu, Oct 13, 2022 at 9:51 PM Joe Evans ***@***.***> wrote:
Closed #21000 as completed.
--
Reply to this email directly or view it on GitHub:
#21000 (comment)
You are receiving this because you are subscribed to this thread.
Message ID: <apache/incubator-mxnet/issue/21000/issue_event/
***@***.***>
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Problem statement
Dear MXNet community,
After the v1.9.0 release, there are many important bug fixes merged into v1.9.x branch. For example:
Based on these bugfixes, we would like to release a 1.9.1 patch release. If there are any outstanding bugfixes or improvements that you would like to see included, please respond to this thread immediately.
We would like to tag the release on Friday, April 15th, 2022, so any changes should be merged by then.
The text was updated successfully, but these errors were encountered: