VYPR
High severityNVD Advisory· Published Nov 8, 2019· Updated Aug 4, 2024

CVE-2019-12408

CVE-2019-12408

Description

It was discovered that the C++ implementation (which underlies the R, Python and Ruby implementations) of Apache Arrow 0.14.0 to 0.14.1 had a uninitialized memory bug when building arrays with null values in some cases. This can lead to uninitialized memory being unintentionally shared if Arrow Arrays are transmitted over the wire (for instance with Flight) or persisted in the streaming IPC and file formats.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Arrow 0.14.0–0.14.1 C++ core has an uninitialized memory bug when building arrays with nulls, risking data leakage across IPC or Flight.

Root

Cause

Apache Arrow versions 0.14.0 and 0.14.1 contain an uninitialized memory bug in the C++ implementation (which also underlies the R, Python, and Ruby bindings). When building arrays that include null values in certain scenarios, memory that has not been properly initialized can be left in the array buffers [1].

Exploitation

No special authentication or network position is required beyond the ability to receive Arrow data. The vulnerability manifests when Arrow Arrays built under these conditions are serialized and transmitted—either over the wire via Arrow Flight or persisted using the streaming IPC and file formats. An attacker who can receive such serialized data may observe the uninitialized memory content [1].

Impact

Because the uninitialized memory can contain residual data from the process, an attacker could extract sensitive information that was previously stored in memory by the same application. This constitutes a confidentiality breach [1][2][3].

Mitigation

The issue is fixed in Apache Arrow 0.14.2 and later. Users of the affected versions should upgrade immediately. The advisory is also tracked in the Ruby (red-arrow) and Python (pyarrow) security databases, confirming the broad impact across language bindings [2][3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
pyarrowPyPI
>= 0.14.0, < 0.15.10.15.1
red-arrowRubyGems
>= 0.14.0, < 0.15.10.15.1

Affected products

3
  • ghsa-coords2 versions
    >= 0.14.0, < 0.15.1+ 1 more
    • (no CPE)range: >= 0.14.0, < 0.15.1
    • (no CPE)range: >= 0.14.0, < 0.15.1
  • Apache Software Foundation/Apache Arrowv5
    Range: Apache Arrow 0.14.0 to 0.14.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.