Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2024-40897

Published: 26 July 2024

Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.

Notes

Author Note
rodrigo-zaiden
from the security advisory:
This only affects developers and CI environments using orcc, not users of liborc.

Priority

Medium

Cvss 3 Severity Score

6.7

Score breakdown

Status

Package Release Status
orc
Launchpad, Ubuntu, Debian
bionic Needs triage

focal
Released (1:0.4.31-1ubuntu0.1)
jammy
Released (1:0.4.32-2ubuntu0.1)
noble
Released (1:0.4.38-1ubuntu0.1)
upstream
Released (1:0.4.39-1)
xenial Needs triage

Patches:
upstream: https://gitlab.freedesktop.org/gstreamer/orc/-/merge_requests/191
upstream: https://gitlab.freedesktop.org/gstreamer/orc/-/commit/fb7db9ae3e8ac271651d1884a3611d30bac04a98

Severity score breakdown

Parameter Value
Base score 6.7
Attack vector Local
Attack complexity High
Privileges required Low
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H