File tree 1 file changed +18
-2
lines changed
1 file changed +18
-2
lines changed Original file line number Diff line number Diff line change @@ -12,7 +12,23 @@ To report a possible security vulnerability, please email [
[email protected] .
12
12
13
13
<hr class =" my-5 " >
14
14
15
- ### [ CVE-2019 -12408] ( https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12408 ) : Uninitialized Memory in C++ ArrayBuilder
15
+ ### [ CVE-2023 -47248] ( https://www.cve.org/CVERecord?id=CVE-2023-47248 ) : Arbitrary code execution when loading a malicious data file in PyArrow
16
+
17
+ ** Severity** : Critical
18
+
19
+ ** Vendor** : The Apache Software Foundation
20
+
21
+ ** Versions affected** : 0.14.0 to 14.0.0
22
+
23
+ ** Description** : Deserialization of untrusted data in IPC and Parquet readers
24
+ in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution.
25
+ An application is vulnerable if it reads Arrow IPC, Feather or Parquet data
26
+ from untrusted sources (for example user-supplied input files).
27
+
28
+ ** Mitigation** : Upgrade to version 14.0.1 or greater. If not possible, use the
29
+ provided [ hotfix package] ( https://pypi.org/project/pyarrow-hotfix/ ) .
30
+
31
+ ### [ CVE-2019 -12408] ( https://www.cve.org/CVERecord?id=CVE-2019-12408 ) : Uninitialized Memory in C++ ArrayBuilder
16
32
17
33
** Severity** : High
18
34
@@ -26,7 +42,7 @@ To report a possible security vulnerability, please email [
[email protected] .
26
42
27
43
<hr class =" my-5 " >
28
44
29
- ### [ CVE-2019 -12410] ( https://cve.mitre. org/cgi-bin/cvename.cgi?name =CVE-2019-12410 ) : Uninitialized Memory in C++ Reading from Parquet
45
+ ### [ CVE-2019 -12410] ( https://www. cve.org/CVERecord?id =CVE-2019-12410 ) : Uninitialized Memory in C++ Reading from Parquet
30
46
31
47
** Severity** : High
32
48
You can’t perform that action at this time.
0 commit comments