CVE-2024-52338
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
28/11/2024
Last modified:
15/07/2025
Description
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R package versions 4.0.0 through 16.1.0 allows arbitrary code execution. An application is vulnerable if it <br />
reads Arrow IPC, Feather or Parquet data from untrusted sources (for <br />
example, user-supplied input files). This vulnerability only affects the arrow R package, not other Apache Arrow <br />
implementations or bindings unless those bindings are specifically used via the R package (for example, an R application that embeds a Python interpreter and uses PyArrow to read files from untrusted sources is still vulnerable if the arrow R package is an affected version). It is recommended that users of the arrow R package upgrade to 17.0.0 or later. Similarly, it<br />
is recommended that downstream libraries upgrade their dependency <br />
requirements to arrow 17.0.0 or later. If using an affected<br />
version of the package, untrusted data can read into a Table and its internal to_data_frame() method can be used as a workaround (e.g., read_parquet(..., as_data_frame = FALSE)$to_data_frame()).<br />
<br />
<br />
This issue affects the Apache Arrow R package: from 4.0.0 through 16.1.0.<br />
<br />
<br />
Users are recommended to upgrade to version 17.0.0, which fixes the issue.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:arrow:*:*:*:*:*:*:*:* | 4.0.0 (including) | 17.0.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



