GHSA-x563-6hqv-26mr

Source
https://github.com/advisories/GHSA-x563-6hqv-26mr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-x563-6hqv-26mr/GHSA-x563-6hqv-26mr.json
Published
2023-11-17T21:47:11Z
Modified
2023-11-17T22:21:22.154993Z
Details

Impact

Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings.

Note that Ibis itself makes extremely limited use of pyarrow.parquet.read_table:

  1. read_table is used in tests, where the input file is entirely controlled by the Ibis developers
  2. read_table is used in the ibis/examples/__init__.py as a fallback for backends that don't support reading Parquet directly. Parquet data used in ibis.examples are also managed by the Ibis developers. This Parquet data is generated from CSV files and SQLite databases.
  3. The Pandas and Dask backends both use PyArrow to read Parquet files and are therefore affected.

Ibis does not make use of APIs that directly read from either Arrow IPC files or Feather files.

Patches

Ibis imports the pyarrow_hotfix package wherever pyarrow is used, as of version 7.1.0.

Upgrading to Arrow 14.0.1 is also a possible solution, starting in Ibis 7.1.0.

Workarounds

Install pyarrow_hotfix and run import pyarrow_hotfix ahead of any and all import ibis statements.

For example:

import ibis

becomes

import pyarrow_hotfix
import ibis

References

https://www.cve.org/CVERecord?id=CVE-2023-47248 https://nvd.nist.gov/vuln/detail/CVE-2023-47248

References

Affected packages

PyPI / ibis-framework

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
7.1.0

Affected versions

0.*

0.3.0
0.4.0
0.4.1
0.5.1
0.5.2
0.6.1
0.7.0
0.7.1
0.8.0
0.8.1
0.9.0
0.10.0
0.11.1
0.11.2
0.12.0
0.13.0
0.14.0

v0.*

v0.6.0

1.*

1.0.0
1.1.0
1.2.0
1.3.0
1.4.0

2.*

2.0.0
2.1.0
2.1.1

3.*

3.0.0
3.0.1
3.0.2
3.1.0
3.2.0

4.*

4.0.0
4.1.0

5.*

5.0.0
5.1.0
5.1.1.dev467
5.1.1.dev516
5.1.1.dev554
5.1.1.dev596

6.*

6.0.0
6.0.1.dev33
6.0.1.dev58
6.0.1.dev128
6.1.0
6.1.1.dev22
6.1.1.dev96
6.1.1.dev135
6.1.1.dev176
6.2.0

7.*

7.0.0.dev230
7.0.0.dev439
7.0.0.dev501
7.0.0.dev525
7.0.0.dev627
7.0.0