Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <24d465d5-d581-4382-d696-e709358c48ff@apache.org>
Date: Tue, 13 May 2025 14:31:24 +0000
From: Dongjoon Hyun <dongjoon@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-47436: Apache ORC: Potential Heap Buffer Overflow during
 C++ LZO Decompression 

Affected versions:

- Apache ORC through 1.8.8
- Apache ORC 1.9.0 through 1.9.5
- Apache ORC 2.0.0 through 2.0.4
- Apache ORC 2.1.0 through 2.1.1

Description:

Heap-based Buffer Overflow vulnerability in Apache ORC.

A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption.

This issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1.

Users are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue.

This issue is being tracked as ORC-1879 

Credit:

Jason Villaluna (reporter)

References:

https://orc.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-47436
https://issues.apache.org/jira/browse/ORC-1879

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.