Apache ORC denial of service vulnerability
- ORC 1.0.0 to 1.4.3
A malformed ORC file can trigger an endlessly recursive function call in the C++ or Java parser.
The impact of this bug is most likely denial-of-service against software that uses the ORC file parser. With the C++ parser, the stack overflow might possibly corrupt the stack.
- 1.3.x and 1.4.x users should upgrade to 1.4.4.
- 1.0.x to 1.2.x users should apply ORC-360 (Java) and ORC-313 (C++).
An ORC file with a struct, union, array, or map type that includes itself as a child will cause the parser to infinitely recurse until the stack overflows.
This issue was discovered by Terry Chia.