Heap-based Buffer Overflow vulnerability in Apache ORC.
A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption.
This issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1.
Users are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue.
Metrics
Affected Vendors & Products
References
History
Wed, 14 May 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 14 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 14 May 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Heap-based Buffer Overflow vulnerability in Apache ORC. A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption. This issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1. Users are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue. | |
Title | Apache ORC: Potential Heap Buffer Overflow during C++ LZO Decompression | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: apache
Published: 2025-05-14T13:11:36.329Z
Updated: 2025-05-14T20:58:23.567Z
Reserved: 2025-05-07T05:04:56.166Z
Link: CVE-2025-47436

Updated: 2025-05-14T13:12:15.382Z

Status : Awaiting Analysis
Published: 2025-05-14T14:15:30.703
Modified: 2025-05-16T14:43:56.797
Link: CVE-2025-47436

No data.