Description
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
Remediation
References
https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.openwall.com/lists/oss-security/2023/09/29/6
Related Vulnerabilities
CVE-2023-28158 Vulnerability in maven package org.apache.archiva:archiva-web-common
CVE-2022-31129 Vulnerability in maven package org.webjars.bower:momentjs
CVE-2023-34396 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2023-28709 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2021-27405 Vulnerability in npm package @progfay/scrapbox-parser