Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-35724


It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.


Published

2022-08-09T07:15:07.387

Last Modified

2024-11-21T07:11:33.353

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-20
    CWE-770
  • Type: Primary
    CWE-835

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache avro < 0.14.0 Yes

References