CVE-2018-8015

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-8015
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-8015.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-8015
Aliases
Related
Withdrawn
2025-08-26T19:03:31.352119Z
Published
2018-05-18T17:29:00Z
Modified
2025-07-16T04:50:46.994163Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In Apache ORC 1.0.0 to 1.4.3 a malformed ORC file can trigger an endlessly recursive function call in the C++ or Java parser. The impact of this bug is most likely denial-of-service against software that uses the ORC file parser. With the C++ parser, the stack overflow might possibly corrupt the stack.

References

Affected packages

Git / github.com/apache/orc

Affected ranges

Type
GIT
Repo
https://github.com/apache/orc
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

rel/release-1.*

rel/release-1.0.0
rel/release-1.1.0
rel/release-1.2.0
rel/release-1.4.0
rel/release-1.4.1
rel/release-1.4.2
rel/release-1.4.3