EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the go/github.com/iskorotkov/avro/v2 package, affecting versions prior to 2.33.0. These vulnerabilities are categorized as remote, unauthenticated denial-of-service (DoS) and integer overflow, with high severity. The vulnerabilities arise from unbounded loop iterations and integer narrowing in the Avro decoder, allowing an attacker to exhaust CPU resources or bypass limits on slice allocations. If exploited, these vulnerabilities could lead to significant business disruption and financial loss due to prolonged system downtime and potential data corruption.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in the go/github.com/iskorotkov/avro/v2 package, affecting versions prior to 2.33.0. These vulnerabilities are categorized as remote, unauthenticated denial-of-service (DoS) and integer overflow, with high severity. The vulnerabilities arise from unbounded loop iterations and integer narrowing in the Avro decoder, allowing an attacker to exhaust CPU resources or bypass limits on slice allocations. If exploited, these vulnerabilities could lead to significant business disruption and financial loss due to prolonged system downtime and potential data corruption.[emaillocker id="1283"]
Exploiting these vulnerabilities requires an untrusted Avro stream, with no primitives reaching beyond denial-of-service on current code paths. Business consequences of exploitation could include prolonged system downtime, potential data corruption, and significant financial loss due to delayed business operations and potential data recovery efforts.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://github.com/advisories/GHSA-w8j3-pq8g-8m7w
https://github.com/advisories/GHSA-mc57-h6j3-3hmv