You are viewing a plain text version of this content. The canonical link for it is here.
Posted to jira@arrow.apache.org by "Micah Kornfield (Jira)" <ji...@apache.org> on 2021/02/10 05:05:00 UTC

[jira] [Resolved] (ARROW-11559) [C++] Improve flatbuffers verification limits

     [ https://issues.apache.org/jira/browse/ARROW-11559?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Micah Kornfield resolved ARROW-11559.
-------------------------------------
    Fix Version/s: 4.0.0
       Resolution: Fixed

Issue resolved by pull request 9447
[https://github.com/apache/arrow/pull/9447]

> [C++] Improve flatbuffers verification limits
> ---------------------------------------------
>
>                 Key: ARROW-11559
>                 URL: https://issues.apache.org/jira/browse/ARROW-11559
>             Project: Apache Arrow
>          Issue Type: Improvement
>          Components: C++
>            Reporter: Antoine Pitrou
>            Assignee: Antoine Pitrou
>            Priority: Major
>              Labels: pull-request-available
>             Fix For: 4.0.0
>
>          Time Spent: 1h
>  Remaining Estimate: 0h
>
> See discussion in [https://github.com/apache/arrow/pull/9349#issuecomment-775295349] :
> Flatbuffers is able to encode a virtually unbounded of schema fields in a small buffer size. Verifying that many fields with the Flatbuffers verifier seems to result in potentially unlimited verification times, which is a denial of service risk.
> The way to mitigate this risk is to pass an appropriate max_tables and/or max_depth limit to the Flatbuffers verifier.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)