Vulnerabilities (CVE)

Filtered by vendor Apache Subscribe
Filtered by product Avro
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-39410 1 Apache 1 Avro 2024-06-21 N/A 7.5 HIGH
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
CVE-2022-36125 1 Apache 1 Avro 2024-02-28 N/A 7.5 HIGH
It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
CVE-2022-36124 1 Apache 1 Avro 2024-02-28 N/A 7.5 HIGH
It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
CVE-2022-35724 1 Apache 1 Avro 2024-02-28 N/A 7.5 HIGH
It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
CVE-2021-43045 1 Apache 1 Avro 2024-02-28 5.0 MEDIUM 7.5 HIGH
A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue.