
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2023-38678) was identified in PaddlePaddle versions before 2.6.0, affecting the paddle.mode functionality. The vulnerability was discovered by Tong Liu of CAS-IIE and involves an out-of-bounds (OOB) access issue that can lead to runtime crashes and denial of service (NVD, Paddle Advisory).
The vulnerability is classified as an out-of-bounds read (CWE-125) that occurs in the paddle.mode function. When invalid axis and dim_size parameters are provided, it can trigger a segmentation fault. The severity assessment shows varying CVSS scores, with NVD rating it as HIGH (7.5) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, while Baidu rates it as MEDIUM (4.7) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L (NVD).
The primary impact of this vulnerability is the potential for denial of service through runtime crashes. When exploited, the vulnerability can cause the application to crash, disrupting normal operations (NVD).
The vulnerability has been patched in PaddlePaddle version 2.6.0. The fix was implemented in commit 19da5c0c4d8c5e4dfef2a92e24141c3f51884dcc. Users are advised to upgrade to PaddlePaddle version 2.6.0 or later to address this vulnerability (Paddle Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."