Integer overflow when reading corrupted .avro file in Avro Rust SDK
Description
It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Avro Rust SDK prior to 0.14.0 can panic when processing corrupted data, enabling denial of service via crafted input.
Vulnerability
Description
CVE-2022-36125 is a denial-of-service vulnerability in the Apache Avro Rust SDK (formerly known as avro-rs) affecting versions prior to 0.14.0. The issue lies in the data deserialization logic: when the SDK reads a specially corrupted data payload, it triggers a panic (runtime crash) instead of gracefully handling the error. This is a classic unhandled panic in Rust, which can cause the entire application process to terminate unexpectedly [1].
Attack
Vector and Exploitation
The vulnerability is exploitable over the network if the application reads Avro-encoded data from untrusted sources, such as user-uploaded files, incoming network messages, or data from third-party services. No prior authentication is required if the application exposes an input endpoint that accepts arbitrary Avro data. The attacker only needs to craft a malformed Avro payload that triggers the panic condition. The attack does not require code execution; it merely needs to supply the corrupted input to a vulnerable version of the library [1][2].
Impact
Successful exploitation leads to an application crash (denial of service). This can be used to disrupt the availability of services that rely on the Apache Avro Rust SDK to deserialize Avro data. Since a single malicious input can terminate the process, it may be leveraged in repeated attacks to keep the service offline. No data corruption, privilege escalation, or information disclosure has been reported for this CVE [1].
Mitigation
The vulnerability is fixed in Apache Avro Rust SDK version 0.14.0. Users should update the apache-avro crate to 0.14.0 or later. There is no known workaround besides updating the library. The CVE does not currently appear on the CISA Known Exploited Vulnerabilities (KEV) list [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
apache-avrocrates.io | < 0.14.0 | 0.14.0 |
Affected products
2- Apache Software Foundation/Apache Avrov5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-3w5g-989p-35r8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-36125ghsaADVISORY
- lists.apache.org/thread/t1r5xz0pvhm4tosqopjpj6dz8zlsht07ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.