![]() Remote attackers to cause a denial of service (DoS) by sending crafted messages to a client or server. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.Īn issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66, and uaToolkit Embedded before 1.40. The fix will be included in TensorFlow 2.7.0. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. TensorFlow is an open source platform for machine learning. An invalid XML element in the type dictionary makes the OPC/UA client crash due to an out-of-memory condition. A malformed OPC/UA message abort packet makes the client crash with a NULL pointer dereference.Īn issue was discovered in Softing OPC UA C++ SDK before 5.70. Softing OPC UA C++ Server SDK, Secure Integration Server, edgeConnector, edgeAggregator, OPC Suite, and uaGate are affected by a NULL pointer dereference vulnerability.Īn issue was discovered in Softing OPC UA C++ SDK before 5.70. The project itself has been archived and updates are not expected. This issue exists on the current commit of the jsonxx project. The value class has a default assignment operator which may be used with pointer types which may point to alterable data where the pointer itself is not updated. In affected versions of jsonxx use of the Value class may lead to memory corruption via a double free or via a use after free. ![]() Jsonxx or Json++ is a JSON parser, writer and reader written in C++. This issue exists on the current commit of the jsonxx project and the project itself has been archived. This issue may lead to Denial of Service if the program using the jsonxx library crashes. In affected versions of jsonxx json parsing may lead to stack exhaustion in an address sanitized (ASAN) build. The allocator is out of memory in /Source/C++/Core/Ap4Array.h.īento4 MP4Dump v1.2 was discovered to contain a segmentation violation via an unknown address at /Source/C++/Core/Ap4DataBuffer.cpp:175.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |