Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+7MY97noRm+cNmUO+QPGRseAvb3vEpyMsG6mVrcVNCLC0yTzg@mail.gmail.com>
Date: Sun, 24 Jul 2022 13:16:59 -0400
From: Sheng Zha <zhasheng@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2022-24294: ReDoS in Apache MXNet RTC Module

Severity: low

Description:

A regular expression used in Apache MXNet (incubating) is vulnerable
to a potential denial-of-service by excessive resource consumption.
The bug could be exploited when loading a model in Apache MXNet that
has a specially crafted operator name that would cause the regular
expression evaluation to use excessive resources to attempt a match.
This issue affects Apache MXNet versions prior to 1.9.1.

Mitigation:

Users that depend on MXNet 1.x are advised to upgrade to MXNet>=1.9.1,<2

Credit:

Apache MXNet would like to thank Dwi Siswanto for reporting this issue.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.