Metrics
Affected Vendors & Products
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache orc |
|
CPEs | cpe:2.3:a:apache:orc:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache orc |
|
Metrics |
cvssV3_1
|
Wed, 14 May 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 14 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 14 May 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Heap-based Buffer Overflow vulnerability in Apache ORC. A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption. This issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1. Users are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue. | |
Title | Apache ORC: Potential Heap Buffer Overflow during C++ LZO Decompression | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: apache
Published: 2025-05-14T13:11:36.329Z
Updated: 2025-05-14T20:58:23.567Z
Reserved: 2025-05-07T05:04:56.166Z
Link: CVE-2025-47436

Updated: 2025-05-14T13:12:15.382Z

Status : Analyzed
Published: 2025-05-14T14:15:30.703
Modified: 2025-07-14T14:55:25.397
Link: CVE-2025-47436

No data.