orbisai0security opened a new pull request, #887:
URL: https://github.com/apache/arrow-nanoarrow/pull/887

   ## Summary
   Fix high severity security issue in 
`thirdparty/flatcc/include/flatcc/portable/pstdint.h`.
   
   ## Vulnerability
   | Field | Value |
   |-------|-------|
   | **ID** | V-001 |
   | **Severity** | HIGH |
   | **Scanner** | multi_agent_ai |
   | **Rule** | `V-001` |
   | **File** | `thirdparty/flatcc/include/flatcc/portable/pstdint.h:833` |
   | **CWE** | CWE-120 |
   
   **Description**: The vendored flatcc portable header pstdint.h uses 
unbounded sprintf() calls to format integer values (including INT64 and UINT64 
maximum values) into fixed-size stack buffers str0 and str1. No maximum output 
length is specified in any of the nine sprintf calls. If the fixed-size buffers 
are smaller than the maximum formatted representation of INT64/UINT64 values 
(up to 20 decimal digits plus sign and null terminator = 22 bytes minimum), a 
stack buffer overflow occurs at library initialization time. This is a latent 
code defect in vendored code rather than a directly injectable attack, but 
represents a real memory safety risk.
   
   ## Changes
   - `thirdparty/flatcc/include/flatcc/portable/pstdint.h`
   
   ## Verification
   - [x] Build passes
   - [x] Scanner re-scan confirms fix
   - [x] LLM code review passed
   
   ---
   *Automated security fix by [OrbisAI Security](https://orbisappsec.com)*
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to