CVE-2024-40897
Published: 26 July 2024
Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.
Notes
Author | Note |
---|---|
rodrigo-zaiden |
from the security advisory: This only affects developers and CI environments using orcc, not users of liborc. |
Priority
Status
Package | Release | Status |
---|---|---|
orc
Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
focal |
Released
(1:0.4.31-1ubuntu0.1)
|
|
jammy |
Released
(1:0.4.32-2ubuntu0.1)
|
|
noble |
Released
(1:0.4.38-1ubuntu0.1)
|
|
upstream |
Released
(1:0.4.39-1)
|
|
xenial |
Needs triage
|
|
Patches:
upstream: https://gitlab.freedesktop.org/gstreamer/orc/-/merge_requests/191 upstream: https://gitlab.freedesktop.org/gstreamer/orc/-/commit/fb7db9ae3e8ac271651d1884a3611d30bac04a98 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.7 |
Attack vector | Local |
Attack complexity | High |
Privileges required | Low |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |