Bug ID | 1202253 |
---|---|
Summary | VUL-0: CVE-2022-35724: python-avro: Denial of service while reading data in Avro Rust SDK |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.4 |
Hardware | Other |
URL | https://smash.suse.de/issue/339200/ |
OS | Other |
Status | NEW |
Severity | Major |
Priority | P5 - None |
Component | Security |
Assignee | otto.hollmann@suse.com |
Reporter | thomas.leroy@suse.com |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
CVE-2022-35724 Posted by Ryan Skraba on Aug 08Severity: important Description: It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue. Credit: This issue was reported to the Apache Avro team by Evan Richter at ForAllSecure and found with Mayhem. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-35724 https://seclists.org/oss-sec/2022/q3/107