
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap buffer overflow vulnerability (CVE-2023-52309) was discovered in PaddlePaddle's paddle.repeat_interleave function affecting versions before 2.6.0. The vulnerability was disclosed on January 3, 2024, and was reported by Tong Liu of CAS-IIE (Vendor Advisory).
The vulnerability occurs in the paddle.repeat_interleave function when processing invalid parameters. It has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) by NIST NVD, while Baidu assigned it a score of 8.2 HIGH (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L). The vulnerability is classified as CWE-787 (Out-of-bounds Write) by NIST and CWE-120 (Buffer Copy without Checking Size of Input) by Baidu (NVD).
The vulnerability can lead to denial of service, information disclosure, or potentially more severe consequences. The high CVSS scores indicate critical severity with potential for complete system compromise (NVD).
The vulnerability has been patched in PaddlePaddle version 2.6.0 with commit 19da5c0c4d8c5e4dfef2a92e24141c3f51884dcc. Users are advised to upgrade to version 2.6.0 or later to address this security issue (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."