CWE
89 502
Advisory Published

GHSA-x563-6hqv-26mr

First published: Fri Nov 17 2023(Updated: )

### Impact Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings. Note that Ibis itself makes **extremely limited** use of `pyarrow.parquet.read_table`: 1. `read_table` is used in tests, where the input file is entirely controlled by the Ibis developers 2. `read_table` is used in the `ibis/examples/__init__.py` as a fallback for backends that don't support reading Parquet directly. Parquet data used in `ibis.examples` are also managed by the Ibis developers. This Parquet data is generated from CSV files and SQLite databases. 3. The Pandas and Dask backends both use PyArrow to read Parquet files and are therefore affected. Ibis **does not** make use of APIs that directly read from either Arrow IPC files or Feather files. ### Patches Ibis imports the `pyarrow_hotfix` package wherever pyarrow is used, as of version 7.1.0. Upgrading to Arrow 14.0.1 is also a possible solution, starting in Ibis 7.1.0. ### Workarounds Install [`pyarrow_hotfix`](https://pypi.org/project/pyarrow-hotfix/) and run `import pyarrow_hotfix` ahead of any and all `import ibis` statements. For example: ```python import ibis ``` becomes ```python import pyarrow_hotfix import ibis ``` ### References https://www.cve.org/CVERecord?id=CVE-2023-47248 https://nvd.nist.gov/vuln/detail/CVE-2023-47248

Affected SoftwareAffected VersionHow to fix
pip/ibis-framework<7.1.0
7.1.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the impact of GHSA-x563-6hqv-26mr?

    Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution.

  • How can I determine if my application is vulnerable to GHSA-x563-6hqv-26mr?

    Your application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources.

  • How do I mitigate the vulnerability GHSA-x563-6hqv-26mr?

    Update your PyArrow version to 7.1.0 or higher.

  • Where can I find more information about GHSA-x563-6hqv-26mr?

    You can find more information about GHSA-x563-6hqv-26mr at the following links: [GitHub Advisory](https://github.com/ibis-project/ibis/security/advisories/GHSA-x563-6hqv-26mr), [GitHub Commit](https://github.com/ibis-project/ibis/commit/0fa1e5dc06783c01e912e8de4d7e10186ca0e364), [GitHub Release](https://github.com/ibis-project/ibis/releases/tag/7.1.0)

  • What are the CWE identifiers for GHSA-x563-6hqv-26mr?

    The CWE identifiers for GHSA-x563-6hqv-26mr are CWE-89 and CWE-502.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2023 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203