Apache MXNet vulnerable to potential denial-of-service by excessive resource consumption
High severity
GitHub Reviewed
Published
Jul 25, 2022
to the GitHub Advisory Database
•
Updated Mar 1, 2023
Description
Published by the National Vulnerability Database
Jul 24, 2022
Published to the GitHub Advisory Database
Jul 25, 2022
Reviewed
Mar 1, 2023
Last updated
Mar 1, 2023
A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resources to attempt a match. This issue affects Apache MXNet versions prior to 1.9.1.
References