Skip to content

Security: apache/arrow-site

Security

security.md

layout title description
default
Security
Security

Reporting Security Issues

Apache Arrow uses the standard process outlined by the Apache Security Team for reporting vulnerabilities. Note that vulnerabilities should not be publicly disclosed until the project has responded.

To report a possible security vulnerability, please email [email protected].


CVE-2023-47248: Arbitrary code execution when loading a malicious data file in PyArrow

Severity: Critical

Vendor: The Apache Software Foundation

Versions affected: 0.14.0 to 14.0.0

Description: Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files).

Mitigation: Upgrade to version 14.0.1 or greater. If not possible, use the provided hotfix package.

CVE-2019-12408: Uninitialized Memory in C++ ArrayBuilder

Severity: High

Vendor: The Apache Software Foundation

Versions affected: 0.14.x

Description: It was discovered that the C++ implementation (which underlies the R, Python and Ruby implementations) of Apache Arrow 0.14.0 to 0.14.1 had a uninitialized memory bug when building arrays with null values in some cases. This can lead to uninitialized memory being unintentionally shared if Arrow Arrays are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats.

Mitigation: Upgrade to version 0.15.1 or greater.

CVE-2019-12410: Uninitialized Memory in C++ Reading from Parquet

Severity: High

Vendor: The Apache Software Foundation

Versions affected: 0.12.0 - 0.14.1

Description: While investigating UBSAN errors in ARROW-6549 it was discovered Apache Arrow versions 0.12.0 to 0.14.1 left memory Array data uninitialized when reading RLE null data from parquet. This affected the C++, Python, Ruby, and R implementations. The uninitialized memory could potentially be shared if are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats.

Mitigation: Upgrade to version 0.15.1 or greater.

There aren’t any published security advisories