![]() |
|
Message-ID: <24d465d5-d581-4382-d696-e709358c48ff@apache.org> Date: Tue, 13 May 2025 14:31:24 +0000 From: Dongjoon Hyun <dongjoon@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-47436: Apache ORC: Potential Heap Buffer Overflow during C++ LZO Decompression Affected versions: - Apache ORC through 1.8.8 - Apache ORC 1.9.0 through 1.9.5 - Apache ORC 2.0.0 through 2.0.4 - Apache ORC 2.1.0 through 2.1.1 Description: Heap-based Buffer Overflow vulnerability in Apache ORC. A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption. This issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1. Users are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue. This issue is being tracked as ORC-1879 Credit: Jason Villaluna (reporter) References: https://orc.apache.org/ https://www.cve.org/CVERecord?id=CVE-2025-47436 https://issues.apache.org/jira/browse/ORC-1879
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.