A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resources to attempt a match. This issue affects Apache MXNet versions prior to 1.9.1.
{ "nvd_published_at": "2022-07-24T18:15:00Z", "github_reviewed_at": "2023-03-01T20:32:45Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-400" ] }