Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-46741: Paddle/pdsa-2022-001.md at develop · PaddlePaddle/Paddle

Out-of-bounds read in gather_tree in PaddlePaddle before 2.4.

CVE
#vulnerability

Permalink

Cannot retrieve contributors at this time

PDSA-2022-001: OOB read in gather_tree****Impact

The PoC is as follows:

import paddle import paddle.fluid as fluid import numpy as np

ids = paddle.to_tensor([[2,2],[6,1]]) parents = paddle.to_tensor([[2,2],[6,1]])

out = paddle.nn.functional.gather_tree(ids,parents)

The implementation of GatherTreeKernel does not validate the ids_dims size which would result in a memory out-of-bounds read if the ids shape is invalid.

template <typename T, typename Context> void GatherTreeKernel(const Context &dev_ctx, const DenseTensor &ids, const DenseTensor &parents, DenseTensor *out) { const auto *ids_data = ids.data<T>(); const auto *parents_data = parents.data<T>();

T *out_data = dev_ctx.template Alloc<T>(out);

auto &ids_dims = ids.dims(); auto max_length = ids_dims[0]; auto batch_size = ids_dims[1]; auto beam_size = ids_dims[2]; //[1]

Patches

We have patched the issue in commit ee6e6d511f9f33fc862c11722701fb5abb99ed94.

The fix will be included in PaddlePaddle 2.4.

For more information

Please consult our security guide for more information regarding the security model and how to contact us with issues and questions.

Attribution

This vulnerability has been reported by Wang Xuan(王旋) of Qihoo 360 AIVul Team.

Related news

GHSA-2hvc-hwg3-hpvw: PaddlePaddle Out-of-bounds Read vulnerability

Out-of-bounds read in `gather_tree` in PaddlePaddle before 2.4. A [patch](https://github.com/PaddlePaddle/Paddle/commit/6712e262fc6734873cc6d5ca4f45973339a88697) is available in the `release/2.4` branch.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907