Apache ORC C++ BufOv in LZO across <1.8.8, 1.9.0-5, 2.0.0-4, 2.1.0-1
CVE-2025-47436 Published on May 14, 2025
Apache ORC: Potential Heap Buffer Overflow during C++ LZO Decompression
Heap-based Buffer Overflow vulnerability in Apache ORC.
A vulnerability has been identified in the ORC C++ LZO decompression logic, where specially crafted malformed ORC files can cause the decompressor to allocate a 250-byte buffer but then attempts to copy 295 bytes into it. It causes memory corruption.
This issue affects Apache ORC C++ library: through 1.8.8, from 1.9.0 through 1.9.5, from 2.0.0 through 2.0.4, from 2.1.0 through 2.1.1.
Users are recommended to upgrade to version 1.8.9, 1.9.6, 2.0.5, and 2.1.2, which fix the issue.
Weakness Type
Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Products Associated with CVE-2025-47436
Want to know whenever a new CVE is published for Apache Orc? stack.watch will email you.
Affected Versions
Apache Software Foundation Apache ORC:- Before and including 1.8.8 is affected.
- Version 1.9.0, <= 1.9.5 is affected.
- Version 2.0.0, <= 2.0.4 is affected.
- Version 2.1.0, <= 2.1.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.