You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@arrow.apache.org by "ASF GitHub Bot (Jira)" <ji...@apache.org> on 2021/02/08 18:57:00 UTC

[jira] [Updated] (ARROW-11559) [C++] Improve flatbuffers verification limits

     [ https://issues.apache.org/jira/browse/ARROW-11559?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

ASF GitHub Bot updated ARROW-11559:
-----------------------------------
    Labels: pull-request-available  (was: )

> [C++] Improve flatbuffers verification limits
> ---------------------------------------------
>
>                 Key: ARROW-11559
>                 URL: https://issues.apache.org/jira/browse/ARROW-11559
>             Project: Apache Arrow
>          Issue Type: Improvement
>          Components: C++
>            Reporter: Antoine Pitrou
>            Assignee: Antoine Pitrou
>            Priority: Major
>              Labels: pull-request-available
>          Time Spent: 10m
>  Remaining Estimate: 0h
>
> See discussion in [https://github.com/apache/arrow/pull/9349#issuecomment-775295349] :
> Flatbuffers is able to encode a virtually unbounded of schema fields in a small buffer size. Verifying that many fields with the Flatbuffers verifier seems to result in potentially unlimited verification times, which is a denial of service risk.
> The way to mitigate this risk is to pass an appropriate max_tables and/or max_depth limit to the Flatbuffers verifier.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)