Description
A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resources to attempt a match. This issue affects Apache MXNet versions prior to 1.9.1.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Workaround
Users that depend on MXNet 1.x are advised to upgrade to MXNet>=1.9.1,<2
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6456 | A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resources to attempt a match. This issue affects Apache MXNet versions prior to 1.9.1. |
Github GHSA |
GHSA-xxj3-55p6-xg3h | Apache MXNet vulnerable to potential denial-of-service by excessive resource consumption |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T04:07:02.340Z
Reserved: 2022-02-01T00:00:00.000Z
Link: CVE-2022-24294
No data.
Status : Modified
Published: 2022-07-24T18:15:09.587
Modified: 2024-11-21T06:50:06.650
Link: CVE-2022-24294
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA