CVE-2023-52303: PaddlePaddle segfault in paddle.put_along_axis
4.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.30844%
CWE
Published
1/3/2024
Updated
11/22/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| paddlepaddle | pip | < 2.6.0 | 2.6.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability stems from improper input validation in two key areas:
- The CastPyArg2* functions in op_function_common.cc failed to exclude Tensor objects when expecting sequences, leading to null pointer dereference when processing invalid inputs to
put_along_axis. The patch explicitly adds PyObject_TypeCheck guards. - SearchsortedInferMeta lacked dimension checks, allowing empty tensors that could cause crashes. The patch adds PADDLE_ENFORCE_GE for dimension validation.
Other changes in the commit add general safety checks but are less directly tied to the specific
put_along_axisvulnerability described.