
Cloud Vulnerability DB
A community-led vulnerabilities database
A null pointer dereference vulnerability was discovered in PaddlePaddle's paddle.crop functionality, identified as CVE-2023-52312. The vulnerability affects versions before 2.6.0 and was disclosed on January 3, 2024. When tensor dimensions are invalid, this vulnerability can trigger a runtime crash (NVD, Paddle Advisory).
The vulnerability is classified as CWE-476 (NULL Pointer Dereference) and has received a CVSS v3.1 base score of 7.5 HIGH from NIST NVD, while Baidu Inc. assessed it at 4.7 MEDIUM. The issue occurs specifically in the paddle.crop function when processing invalid tensor dimensions. The vulnerability can be triggered by providing specific invalid input parameters to the crop function (NVD).
When exploited, this vulnerability can cause a runtime crash and lead to a denial of service condition in applications using the affected PaddlePaddle versions (NVD).
The vulnerability has been patched in PaddlePaddle version 2.6.0 with commit c074de6911944d5d30d28cc7ce2c7099f1c87bce. Users are recommended to upgrade to version 2.6.0 or later to address this security issue (Paddle Advisory).
The vulnerability was initially reported by Peng Zhou (zpbrent) from Shanghai University (Paddle Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."