logo

CVE-2022-35724 apache-avro

Package

Manager: cargo
Name: apache-avro
Vulnerable Version: >=0 <0.14.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00698 pctl0.71074

Details

Apache Avro Rust SDK vulnerable to reader looping in cycle endlessly, consuming CPU It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.

Metadata

Created: 2022-08-10T00:00:31Z
Modified: 2022-08-18T19:15:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-v456-chpw-6mmw/GHSA-v456-chpw-6mmw.json
CWE IDs: ["CWE-835"]
Alternative ID: GHSA-v456-chpw-6mmw
Finding: F138
Auto approve: 1