Safety vulnerability ID: 54460
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resources to attempt a match. This issue affects Apache MXNet versions prior to 1.9.1.
Latest version: 1.9.1
Apache MXNet is an ultra-scalable deep learning framework. This version uses openblas and MKLDNN.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application