Revision d5ef45a0e0a202811262316299b9b954c4b85144 authored by Nikita Manovich on 18 May 2023, 18:40:40 UTC, committed by GitHub on 18 May 2023, 18:40:40 UTC
### Added
- Introduced a new configuration option for controlling the invocation of Nuclio functions.
  (<https://github.com/opencv/cvat/pull/6146>)

### Changed
- Relocated SAM masks decoder to frontend operation.
  (<https://github.com/opencv/cvat/pull/6019>)
- Switched `person-reidentification-retail-0300` and `faster_rcnn_inception_v2_coco` Nuclio functions with `person-reidentification-retail-0277` and `faster_rcnn_inception_resnet_v2_atrous_coco` respectively.
  (<https://github.com/opencv/cvat/pull/6129>)
- Upgraded OpenVINO-based Nuclio functions to utilize the OpenVINO 2022.3 runtime.
  (<https://github.com/opencv/cvat/pull/6129>)

### Fixed
- Resolved issues with tracking multiple objects (30 and more) using the TransT tracker.
  (<https://github.com/opencv/cvat/pull/6073>)
- Addressed azure.core.exceptions.ResourceExistsError: The specified blob already exists.
  (<https://github.com/opencv/cvat/pull/6082>)
- Corrected image scaling issues when transitioning between images of different resolutions.
  (<https://github.com/opencv/cvat/pull/6081>)
- Fixed inaccurate reporting of completed job counts.
  (<https://github.com/opencv/cvat/issues/6098>)
- Allowed OpenVINO-based Nuclio functions to be deployed to Kubernetes.
  (<https://github.com/opencv/cvat/pull/6129>)
- Improved skeleton size checks after drawing.
  (<https://github.com/opencv/cvat/pull/6156>)
- Fixed HRNet CPU serverless function.
  (<https://github.com/opencv/cvat/pull/6150>)
- Prevented sending of empty list of events.
  (<https://github.com/opencv/cvat/pull/6154>)
2 parent s 8a2c23f + fa4a200
Raw File
SECURITY.md
# Security Policy

## Supported Versions

At the moment only the latest release is supported. When you report a security issue,
be sure it can be reproduced in the supported version.

| Version | Supported          |
| ------- | ------------------ |
| 2.0.0   | :white_check_mark: |
| <2.0.0  | :x:                |

## Reporting a Vulnerability

If you have information about a security issue or vulnerability in the product, please
send an e-mail to [secure@cvat.ai](mailto:secure+github@cvat.ai).

Please provide as much information as possible, including:

- The products and versions affected
- Detailed description of the vulnerability
- Information on known exploits
- A member of the CVAT.ai Product Security Team will review your e-mail and contact you to
  collaborate on resolving the issue.
back to top