You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@arrow.apache.org by "ASF GitHub Bot (Jira)" <ji...@apache.org> on 2021/02/08 18:57:00 UTC
[jira] [Updated] (ARROW-11559) [C++] Improve flatbuffers
verification limits
[ https://issues.apache.org/jira/browse/ARROW-11559?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
ASF GitHub Bot updated ARROW-11559:
-----------------------------------
Labels: pull-request-available (was: )
> [C++] Improve flatbuffers verification limits
> ---------------------------------------------
>
> Key: ARROW-11559
> URL: https://issues.apache.org/jira/browse/ARROW-11559
> Project: Apache Arrow
> Issue Type: Improvement
> Components: C++
> Reporter: Antoine Pitrou
> Assignee: Antoine Pitrou
> Priority: Major
> Labels: pull-request-available
> Time Spent: 10m
> Remaining Estimate: 0h
>
> See discussion in [https://github.com/apache/arrow/pull/9349#issuecomment-775295349] :
> Flatbuffers is able to encode a virtually unbounded of schema fields in a small buffer size. Verifying that many fields with the Flatbuffers verifier seems to result in potentially unlimited verification times, which is a denial of service risk.
> The way to mitigate this risk is to pass an appropriate max_tables and/or max_depth limit to the Flatbuffers verifier.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)