Description
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
Remediation
References
https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.openwall.com/lists/oss-security/2023/09/29/6
Related Vulnerabilities
CVE-2023-30520 Vulnerability in maven package org.jenkins-ci.plugins:quayio-trigger
CVE-2023-33695 Vulnerability in maven package cn.hutool:hutool-core
CVE-2017-5638 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2021-32803 Vulnerability in npm package tar
CVE-2023-41329 Vulnerability in maven package com.github.tomakehurst:wiremock-jre8-standalone