Apache Avro
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Apache Avro.
By the Year
In 2025 there have been 0 vulnerabilities in Apache Avro. Avro did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 1 | 7.50 |
2022 | 4 | 7.50 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 1 | 9.80 |
2018 | 0 | 0.00 |
It may take a day or so for new Avro vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Apache Avro Security Vulnerabilities
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the
CVE-2023-39410
7.5 - High
- September 29, 2023
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
Marshaling, Unmarshaling
It is possible to crash (panic) an application by providing a corrupted data to be read
CVE-2022-36125
7.5 - High
- August 09, 2022
It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
Integer Overflow or Wraparound
It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU
CVE-2022-35724
7.5 - High
- August 09, 2022
It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
Infinite Loop
It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system
CVE-2022-36124
7.5 - High
- August 09, 2022
It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
Allocation of Resources Without Limits or Throttling
A vulnerability in the .NET SDK of Apache Avro
CVE-2021-43045
7.5 - High
- January 06, 2022
A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue.
Allocation of Resources Without Limits or Throttling
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT
CVE-2019-17195
9.8 - Critical
- October 15, 2019
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.
Improper Handling of Exceptional Conditions
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Oracle Solaris Cluster or by Apache? Click the Watch button to subscribe.
