Informazioni sul CVE-2022-26477
Denial of service in readExternal method
CWE ID: CWE-400
Base Score (CVSS): N/A
CVE: CVE-2022-26477
Descrizione: The Security Team noticed that the termination condition of the for loop in the readExternal method is a controllable variable, which, if tampered with, may lead to CPU exhaustion. As a fix, we added an upper bound and termination condition in the read and write logic. We classify it as a “low-priority but useful improvement”. SystemDS is a distributed system and needs to serialize/deserialize data but in many code paths (e.g., on Spark broadcast/shuffle or writing to sequence files) the byte stream is anyway protected by additional CRC fingerprints. In this particular case though, the number of decoders is upper-bounded by twice the number of columns, which means an attacker would need to modify two entries in the byte stream in a consistent manner. By adding these checks robustness was strictly improved with almost zero overhead. These code changes are available in versions higher than 2.2.1.
Vettore di attacco
Punteggio CVSS
Il CVSS è un sistema di valutazione che misura la gravità di una vulnerabilità informatica considerando fattori come l’impatto potenziale, la probabilità di attacco e la facilità di esecuzione.
Riassunto: .
Dettaglio del Vettore
Metrica | Valore | Significato | Descrizione |
---|
Riferimenti esterni
- https://lists.apache.org/thread/r4x2d2r6d4zykdrrx6s2l4qbxgzws0z3
- https://security.netapp.com/advisory/ntap-20220812-0003/
Prodotti interessati
- Apache Software Foundation – Apache SystemDS
Relazioni con altri prodotti
Produttore:Apache Software Foundation
Prodotto: Apache SystemDS
Anno: 2022
CWE: CWE-400
CVSS: 0.0