Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14NTYzLTZocXYtMjZtcs4AA3P0
Ibis PyArrow dependency allows arbitrary code execution when loading a malicious data file
Impact
Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings.
Note that Ibis itself makes extremely limited use of pyarrow.parquet.read_table
:
read_table
is used in tests, where the input file is entirely controlled by the Ibis developersread_table
is used in theibis/examples/__init__.py
as a fallback for backends that don't support reading Parquet directly. Parquet data used inibis.examples
are also managed by the Ibis developers. This Parquet data is generated from CSV files and SQLite databases.- The Pandas and Dask backends both use PyArrow to read Parquet files and are therefore affected.
Ibis does not make use of APIs that directly read from either Arrow IPC files or Feather files.
Patches
Ibis imports the pyarrow_hotfix
package wherever pyarrow is used, as of version 7.1.0.
Upgrading to Arrow 14.0.1 is also a possible solution, starting in Ibis 7.1.0.
Workarounds
Install pyarrow_hotfix
and run import pyarrow_hotfix
ahead of any and all import ibis
statements.
For example:
import ibis
becomes
import pyarrow_hotfix
import ibis
References
https://www.cve.org/CVERecord?id=CVE-2023-47248
https://nvd.nist.gov/vuln/detail/CVE-2023-47248
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14NTYzLTZocXYtMjZtcs4AA3P0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
Identifiers: GHSA-x563-6hqv-26mr
References:
- https://github.com/ibis-project/ibis/security/advisories/GHSA-x563-6hqv-26mr
- https://github.com/ibis-project/ibis/commit/0fa1e5dc06783c01e912e8de4d7e10186ca0e364
- https://github.com/ibis-project/ibis/releases/tag/7.1.0
- https://github.com/advisories/GHSA-x563-6hqv-26mr
Blast Radius: 0.0
Affected Packages
pypi:ibis-framework
Dependent packages: 25Dependent repositories: 130
Downloads: 287,997 last month
Affected Version Ranges: < 7.1.0
Fixed in: 7.1.0
All affected versions: 0.3.0, 0.4.0, 0.4.1, 0.5.1, 0.5.2, 0.6.0, 0.6.1, 0.7.0, 0.7.1, 0.8.0, 0.8.1, 0.9.0, 0.10.0, 0.11.1, 0.11.2, 0.12.0, 0.13.0, 0.14.0, 1.0.0, 1.1.0, 1.2.0, 1.3.0, 1.4.0, 2.0.0, 2.1.0, 2.1.1, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 3.2.0, 4.0.0, 4.1.0, 5.0.0, 5.1.0, 6.0.0, 6.1.0, 6.2.0, 7.0.0
All unaffected versions: 7.1.0, 7.2.0, 8.0.0, 9.0.0, 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0