|
Message-ID: <886d9e95-0445-3d37-87ab-e73de79132dd@apache.org> Date: Mon, 08 Aug 2022 19:33:41 +0000 From: Ryan Skraba <rskraba@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2022-36125: Apache Avro: Integer overflow when reading corrupted .avro file in Avro Rust SDK Severity: important Description: It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue. Credit: This issue was reported to the Apache Avro team by Evan Richter at ForAllSecure and found with Mayhem.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.