Apache Arrow vulnerabilities
5 known vulnerabilities affecting apache/arrow.
Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH4
Vulnerabilities
Page 1 of 1
CVE-2026-25087HIGHCVSS 7.0≥ 15.0.0, < 23.0.12026-02-17
CVE-2026-25087 [HIGH] CWE-416 CVE-2026-25087: Use After Free vulnerability in Apache Arrow C++.
This issue affects Apache Arrow C++ from 15.0.0 t
Use After Free vulnerability in Apache Arrow C++.
This issue affects Apache Arrow C++ from 15.0.0 through 23.0.0. It can be triggered when reading an Arrow IPC file (but not an IPC stream) with pre-buffering enabled, if the IPC file contains data with variadic buffers (such as Binary View and String View data). Depending on the number of variadic buf
nvd
CVE-2024-52338CRITICALCVSS 9.8≥ 4.0.0, < 17.0.02024-11-28
CVE-2024-52338 [CRITICAL] CWE-502 CVE-2024-52338: Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 4.0.0 through 16.1.0 allows arbitrary code execution. An application is vulnerable if it
reads Arrow IPC, Feather or Parquet data from untrusted sources (for
example, user-supplied input files). This vulnerability only affects the arrow R package, no
nvd
CVE-2024-41178HIGHCVSS 7.5≥ 0.5.0, ≤ 0.10.12024-07-23
CVE-2024-41178 [HIGH] CWE-532 CVE-2024-41178: Exposure of temporary credentials in logs in Apache Arrow Rust Object Store (`object_store` crate),
Exposure of temporary credentials in logs in Apache Arrow Rust Object Store (`object_store` crate), version 0.10.1 and earlier on all platforms using AWS WebIdentityTokens.
On certain error conditions, the logs may contain the OIDC token passed to AssumeRoleWithWebIdentity https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdenti
nvd
CVE-2019-12408HIGHCVSS 7.5≥ 0.14.0, ≤ 0.14.12019-11-08
CVE-2019-12408 [HIGH] CWE-909 CVE-2019-12408: It was discovered that the C++ implementation (which underlies the R, Python and Ruby implementation
It was discovered that the C++ implementation (which underlies the R, Python and Ruby implementations) of Apache Arrow 0.14.0 to 0.14.1 had a uninitialized memory bug when building arrays with null values in some cases. This can lead to uninitialized memory being unintentionally shared if Arrow Arrays are transmitted over the wire (for instance with F
nvd
CVE-2019-12410HIGHCVSS 7.5≥ 0.12.0, ≤ 0.14.12019-11-08
CVE-2019-12410 [HIGH] CWE-909 CVE-2019-12410: While investigating UBSAN errors in https://github.com/apache/arrow/pull/5365 it was discovered Apac
While investigating UBSAN errors in https://github.com/apache/arrow/pull/5365 it was discovered Apache Arrow versions 0.12.0 to 0.14.1, left memory Array data uninitialized when reading RLE null data from parquet. This affected the C++, Python, Ruby and R implementations. The uninitialized memory could potentially be shared if are transmitted over the
nvd