This is an automated email from the ASF dual-hosted git repository.

cnauroth pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/hadoop-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 34b23538a07 HDFS-17754: Add CVE-2025-27821 description
34b23538a07 is described below

commit 34b23538a0786e3deb348ad510262c6f49ea609c
Author: Chris Nauroth <[email protected]>
AuthorDate: Mon Jan 26 23:53:53 2026 +0000

    HDFS-17754: Add CVE-2025-27821 description
    
    Closes #75
    
    Signed-off-by: Ayush Saxena <[email protected]>
---
 content/cve_list.html | 13 +++++++++++++
 src/cve_list.md       | 17 +++++++++++++++++
 2 files changed, 30 insertions(+)

diff --git a/content/cve_list.html b/content/cve_list.html
index c9915826f07..6d155e4db9e 100644
--- a/content/cve_list.html
+++ b/content/cve_list.html
@@ -178,6 +178,19 @@ One paragraph summary goes here. Don't need nuts-and-bolts 
detail, just enough f
 - **Reported Date**:
 - **Issue Announced**:
 -->
+<h2 
id="cve-2025-27821-out-of-bounds-write-in-uri-parser-of-native-hdfs-client"><a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27821";>CVE-2025-27821</a>
 Out of bounds write in URI parser of native HDFS client</h2>
+<p>Out-of-bounds Write vulnerability in Apache Hadoop HDFS native client.</p>
+<p>This issue affects Apache Hadoop: from 3.2.0 before 3.4.2.</p>
+<p>Users are recommended to upgrade to version 3.4.2, which fixes the 
issue.</p>
+<p>This issue is being tracked as <a 
href="https://issues.apache.org/jira/browse/HDFS-17754";>HDFS-17754</a>.</p>
+<ul>
+<li><strong>Versions affected</strong>: 3.2.0 to 3.4.1</li>
+<li><strong>Fixed versions</strong>: 3.4.2</li>
+<li><strong>Impact</strong>: Memory Corruption</li>
+<li><strong>Reporter</strong>: BUI Ngoc Tan</li>
+<li><strong>Reported Date</strong>: 2025/03/01</li>
+<li><strong>Issue Announced</strong>: 2026/01/23</li>
+</ul>
 <h2 
id="cve-2023-26031-privilege-escalation-in-apache-haoop-yarn-container-executor-binary-on-linux-systems"><a
 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26031";>CVE-2023-26031</a>
 Privilege escalation in Apache Haoop Yarn container-executor binary on Linux 
systems</h2>
 <p>Relative library resolution in linux container-executor binary in Apache 
Hadoop 3.3.1-3.3.4 on Linux allows local user to gain root privileges. If the 
YARN cluster is accepting work from remote (authenticated) users, this MAY 
permit remote users to gain root privileges.</p>
 <p>Hadoop 3.3.0 updated the <a 
href="https://hadoop.apache.org/docs/stable/hadoop-yarn/hadoop-yarn-site/SecureContainer.html";>YARN
 Secure Containers</a> to add a feature for executing user-submitted 
applications in isolated linux containers.</p>
diff --git a/src/cve_list.md b/src/cve_list.md
index 5b85406df9b..cb9960ce911 100644
--- a/src/cve_list.md
+++ b/src/cve_list.md
@@ -37,6 +37,23 @@ One paragraph summary goes here. Don't need nuts-and-bolts 
detail, just enough f
 - **Issue Announced**:
 -->
 
+## 
[CVE-2025-27821](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27821) 
Out of bounds write in URI parser of native HDFS client
+
+Out-of-bounds Write vulnerability in Apache Hadoop HDFS native client.
+
+This issue affects Apache Hadoop: from 3.2.0 before 3.4.2.
+
+Users are recommended to upgrade to version 3.4.2, which fixes the issue.
+
+This issue is being tracked as 
[HDFS-17754](https://issues.apache.org/jira/browse/HDFS-17754).
+
+- **Versions affected**: 3.2.0 to 3.4.1
+- **Fixed versions**: 3.4.2
+- **Impact**: Memory Corruption
+- **Reporter**: BUI Ngoc Tan
+- **Reported Date**: 2025/03/01
+- **Issue Announced**: 2026/01/23
+
 ## 
[CVE-2023-26031](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26031) 
Privilege escalation in Apache Haoop Yarn container-executor binary on Linux 
systems
 
 Relative library resolution in linux container-executor binary in Apache 
Hadoop 3.3.1-3.3.4 on Linux allows local user to gain root privileges. If the 
YARN cluster is accepting work from remote (authenticated) users, this MAY 
permit remote users to gain root privileges.


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to