We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-12720

Regular Expression Denial of Service (ReDoS) in huggingface/transformers



Description

A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file tokenization_nougat_fast.py. The vulnerability occurs in the post_process_single() function, where a regular expression processes specially crafted input. The issue stems from the regex exhibiting exponential time complexity under certain conditions, leading to excessive backtracking. This can result in significantly high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.46.3 (latest).

Reserved 2024-12-17 | Published 2025-03-20 | Updated 2025-03-20 | Assigner @huntr_ai


MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

CWE-1333 Inefficient Regular Expression Complexity

Product status

Any version before 4.48.0
affected

References

huntr.com/bounties/4bed1214-7835-4252-a853-22bbad891f98

github.com/...ommit/deac971c469bcbb182c2e52da0b82fb3bf54cccf

cve.org (CVE-2024-12720)

nvd.nist.gov (CVE-2024-12720)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-12720

Support options

Helpdesk Chat, Email, Knowledgebase