Apache Avro Rust SDK <0.14.0: OOM via Reader
CVE-2022-36124 Published on August 9, 2022

Memory overconsumption in Avro Rust SDK
It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.

NVD

Weakness Type

Allocation of Resources Without Limits or Throttling

The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.


Products Associated with CVE-2022-36124

Want to know whenever a new CVE is published for Apache Avro? stack.watch will email you.

 

Affected Versions

Apache Software Foundation Apache Avro:

Exploit Probability

EPSS
2.96%
Percentile
86.23%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.