Vulnerability Description
It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Avro | < 0.14.0 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/771z1nwrpkn1ovmyfb2fm65mchdxgy7pMailing ListVendor Advisory
- https://lists.apache.org/thread/771z1nwrpkn1ovmyfb2fm65mchdxgy7pMailing ListVendor Advisory
FAQ
What is CVE-2022-35724?
CVE-2022-35724 is a vulnerability with a CVSS score of 7.5 (HIGH). It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously ...
How severe is CVE-2022-35724?
CVE-2022-35724 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-35724?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Avro.