{"id":"CVE-2023-38669","details":"Use after free in paddle.diagonal in PaddlePaddle before 2.5.0. This resulted in a potentially exploitable condition.\n","aliases":["GHSA-8wfh-qxxv-3q8c","PYSEC-2023-122"],"modified":"2026-04-10T04:59:09.309737Z","published":"2023-07-26T10:15:11.457Z","references":[{"type":"FIX","url":"https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/paddlepaddle/paddle","events":[{"introduced":"0"},{"fixed":"feff99f5e164afd0b9c4dd27264db37de75ce0cb"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.5.0"}]}}],"versions":["V0.8.0b0","V0.8.0b1","v0.10.0rc","v0.10.0rc4","v0.11.1a1","v0.11.1a2","v0.12.0","v0.15.0-rc0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-38669.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}