layout | title | description |
---|---|---|
default |
Security |
Security |
Apache Arrow uses the standard process outlined by the Apache Security Team for reporting vulnerabilities. Note that vulnerabilities should not be publicly disclosed until the project has responded.
To report a possible security vulnerability, please email [email protected].
CVE-2023-47248: Arbitrary code execution when loading a malicious data file in PyArrow
Severity: Critical
Vendor: The Apache Software Foundation
Versions affected: 0.14.0 to 14.0.0
Description: Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files).
Mitigation: Upgrade to version 14.0.1 or greater. If not possible, use the provided hotfix package.
CVE-2019-12408: Uninitialized Memory in C++ ArrayBuilder
Severity: High
Vendor: The Apache Software Foundation
Versions affected: 0.14.x
Description: It was discovered that the C++ implementation (which underlies the R, Python and Ruby implementations) of Apache Arrow 0.14.0 to 0.14.1 had a uninitialized memory bug when building arrays with null values in some cases. This can lead to uninitialized memory being unintentionally shared if Arrow Arrays are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats.
Mitigation: Upgrade to version 0.15.1 or greater.
CVE-2019-12410: Uninitialized Memory in C++ Reading from Parquet
Severity: High
Vendor: The Apache Software Foundation
Versions affected: 0.12.0 - 0.14.1
Description: While investigating UBSAN errors in ARROW-6549 it was discovered Apache Arrow versions 0.12.0 to 0.14.1 left memory Array data uninitialized when reading RLE null data from parquet. This affected the C++, Python, Ruby, and R implementations. The uninitialized memory could potentially be shared if are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats.
Mitigation: Upgrade to version 0.15.1 or greater.