Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings.
Note that Ibis itself makes extremely limited use of
read_tableis used in tests, where the input file is entirely controlled by the Ibis developers
read_tableis used in the
ibis/examples/__init__.pyas a fallback for backends that don't support reading Parquet directly. Parquet data used in
ibis.examplesare also managed by the Ibis developers. This Parquet data is generated from CSV files and SQLite databases.
Ibis does not make use of APIs that directly read from either Arrow IPC files or Feather files.
Ibis imports the
pyarrow_hotfix package wherever pyarrow is used, as of version 7.1.0.
Upgrading to Arrow 14.0.1 is also a possible solution, starting in Ibis 7.1.0.
pyarrow_hotfix and run
import pyarrow_hotfix ahead of any and all
import ibis statements.
import pyarrow_hotfix import ibis