CVE-2022-26477 – org.apache.systemds:systemds
Package
Manager: maven
Name: org.apache.systemds:systemds
Vulnerable Version: >=0 <2.2.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.07001 pctl0.91095
Details
SystemDS CPU exhaustion vulnerability The Security Team noticed that the termination condition of the for loop in the readExternal method is a controllable variable, which, if tampered with, may lead to CPU exhaustion. As a fix, we added an upper bound and termination condition in the read and write logic. We classify it as a "low-priority but useful improvement". SystemDS is a distributed system and needs to serialize/deserialize data but in many code paths (e.g., on Spark broadcast/shuffle or writing to sequence files) the byte stream is anyway protected by additional CRC fingerprints. In this particular case though, the number of decoders is upper-bounded by twice the number of columns, which means an attacker would need to modify two entries in the byte stream in a consistent manner. By adding these checks robustness was strictly improved with almost zero overhead. These code changes are available in versions higher than 2.2.1.
Metadata
Created: 2022-06-28T00:00:48Z
Modified: 2024-10-28T14:36:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-m43h-hfrq-x8wx/GHSA-m43h-hfrq-x8wx.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-m43h-hfrq-x8wx
Finding: F067
Auto approve: 1