Vulnerabilities > Mindspore
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-05-30 | CVE-2023-2970 | Unspecified vulnerability in Mindspore 2.0.0 A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. | 6.5 |
2022-06-27 | CVE-2021-33647 | Out-of-bounds Write vulnerability in Mindspore When performing the inference shape operation of the Tile operator, if the input data type is not int or int32, it will access data outside of bounds of heap allocated buffers. | 7.5 |
2022-06-27 | CVE-2021-33648 | Out-of-bounds Read vulnerability in Mindspore When performing the inference shape operation of Affine, Concat, MatMul, ArgMinMax, EmbeddingLookup, and Gather operators, if the input shape size is 0, it will access data outside of bounds of shape which allocated from heap buffers. | 7.5 |
2022-06-27 | CVE-2021-33649 | Out-of-bounds Read vulnerability in Mindspore When performing the inference shape operation of the Transpose operator, if the value in the perm element is greater than or equal to the size of the input_shape, it will access data outside of bounds of input_shape which allocated from heap buffers. | 7.5 |
2022-06-27 | CVE-2021-33650 | Out-of-bounds Read vulnerability in Mindspore 1.2.0/1.2.1 When performing the inference shape operation of the SparseToDense operator, if the number of inputs is less than three, it will access data outside of bounds of inputs which allocated from heap buffers. | 7.5 |
2022-06-27 | CVE-2021-33651 | Divide By Zero vulnerability in Mindspore When performing the analytical operation of the DepthwiseConv2D operator, if the attribute depth_multiplier is 0, it will cause a division by 0 exception. | 7.5 |
2022-06-27 | CVE-2021-33652 | Divide By Zero vulnerability in Mindspore When the Reduce operator run operation is executed, if there is a value of 0 in the parameter axis_sizes element, it will cause a division by 0 exception. | 7.5 |
2022-06-27 | CVE-2021-33653 | Divide By Zero vulnerability in Mindspore When performing the derivation shape operation of the SpaceToBatch operator, if there is a value of 0 in the parameter block_shape element, it will cause a division by 0 exception. | 7.5 |
2022-06-27 | CVE-2021-33654 | Divide By Zero vulnerability in Mindspore When performing the initialization operation of the Split operator, if a dimension in the input shape is 0, it will cause a division by 0 exception. | 7.5 |