Apache Avro Rust SDK vulnerable to reader looping in cycle endlessly, consuming CPU
High severity
GitHub Reviewed
Published
Aug 10, 2022
to the GitHub Advisory Database
•
Updated Jan 30, 2023
Description
Published by the National Vulnerability Database
Aug 9, 2022
Published to the GitHub Advisory Database
Aug 10, 2022
Reviewed
Aug 18, 2022
Last updated
Jan 30, 2023
It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
References