{"uuid": "4b0ac6bc-a412-41ab-9aa7-2bb2f4e59cc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-35724", "type": "seen", "source": "https://t.me/cibsecurity/47769", "content": "\u203c CVE-2022-35724 \u203c\n\nIt is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-08-09T12:24:34.000000Z"}