orbisai0security opened a new pull request, #887: URL: https://github.com/apache/arrow-nanoarrow/pull/887
## Summary Fix high severity security issue in `thirdparty/flatcc/include/flatcc/portable/pstdint.h`. ## Vulnerability | Field | Value | |-------|-------| | **ID** | V-001 | | **Severity** | HIGH | | **Scanner** | multi_agent_ai | | **Rule** | `V-001` | | **File** | `thirdparty/flatcc/include/flatcc/portable/pstdint.h:833` | | **CWE** | CWE-120 | **Description**: The vendored flatcc portable header pstdint.h uses unbounded sprintf() calls to format integer values (including INT64 and UINT64 maximum values) into fixed-size stack buffers str0 and str1. No maximum output length is specified in any of the nine sprintf calls. If the fixed-size buffers are smaller than the maximum formatted representation of INT64/UINT64 values (up to 20 decimal digits plus sign and null terminator = 22 bytes minimum), a stack buffer overflow occurs at library initialization time. This is a latent code defect in vendored code rather than a directly injectable attack, but represents a real memory safety risk. ## Changes - `thirdparty/flatcc/include/flatcc/portable/pstdint.h` ## Verification - [x] Build passes - [x] Scanner re-scan confirms fix - [x] LLM code review passed --- *Automated security fix by [OrbisAI Security](https://orbisappsec.com)* -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected]
