
Cloud Vulnerability DB
A community-led vulnerabilities database
A floating-point exception (FPE) vulnerability was discovered in the paddle.amin function of PaddlePaddle versions before 2.6.0. The vulnerability is tracked as CVE-2023-52308 and was reported by Tong Liu of CAS-IIE (Vendor Advisory).
The vulnerability occurs in the paddle.amin function when processing input tensors with invalid dimensions. The issue is classified as CWE-369 (Divide By Zero) and has received varying CVSS v3.1 scores: NIST assigned a HIGH severity score of 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), while Baidu, Inc. rated it as MEDIUM severity with a score of 4.7 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L) (NVD).
When exploited, this vulnerability can cause a runtime crash and a denial of service condition in the affected system (NVD).
The vulnerability has been patched in PaddlePaddle version 2.6.0. The fix was implemented in commit 19da5c0c4d8c5e4dfef2a92e24141c3f51884dcc. Users are advised to upgrade to PaddlePaddle version 2.6.0 or later to address this vulnerability (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."