|
Message-ID: <CA+7MY97noRm+cNmUO+QPGRseAvb3vEpyMsG6mVrcVNCLC0yTzg@mail.gmail.com> Date: Sun, 24 Jul 2022 13:16:59 -0400 From: Sheng Zha <zhasheng@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2022-24294: ReDoS in Apache MXNet RTC Module Severity: low Description: A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resources to attempt a match. This issue affects Apache MXNet versions prior to 1.9.1. Mitigation: Users that depend on MXNet 1.x are advised to upgrade to MXNet>=1.9.1,<2 Credit: Apache MXNet would like to thank Dwi Siswanto for reporting this issue.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.