rdblue opened a new issue, #16475: URL: https://github.com/apache/iceberg/issues/16475
> This issue was reported to the private Apache Iceberg security mailing list. The submitter is being kept anonymous because the report was sent to a private list. After review, the issue is not considered a serious vulnerability that needs to be kept private, so it is being filed publicly here for tracking and resolution. > > Note: this submission was generated by AI. Please review its claims and source references carefully before acting on them. # Summary Deletion-vector metadata accepts negative or near-2 GiB sizes and offsets, allowing hostile metadata to trigger crashes or huge read-time allocations. # Affected Maven coordinates * primary shipped client artifact: `org.apache.iceberg:iceberg-data` # Attacker prerequisites * ability to make the target process parse attacker-controlled or semi-trusted table data or metadata * enough repetition or input size to trigger the unchecked allocation or crash path # Impact * Malicious or corrupted DV metadata can trigger `NegativeArraySizeException`, invalid seek behavior, or a very large heap allocation on the read path. * In practice this is a denial-of-service issue: scanning a table can be enough to crash or destabilize the worker that evaluates the deletion vector. # Proof status Source review only. The issue is visible directly from source. # Key source references * org.apache.iceberg.data.BaseDeleteLoader * org.apache.iceberg.FileMetadata Current severity assessment [2]: Important [1] https://iceberg.apache.org/security/ [2] https://security.apache.org/blog/severityrating/ -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected] --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
