CVE-2024-40897

Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
jpcertCNA
---
---
CISA-ADPADP
7 HIGH
LOCAL
HIGH
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 10%
VendorProductVersion
gstreamerorc
𝑥
< 0.4.39
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
orc
bullseye
no-dsa
bookworm
no-dsa
sid
1:0.4.41-1
fixed
trixie
1:0.4.41-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
orc
noble
Fixed 1:0.4.38-1ubuntu0.1
released
jammy
Fixed 1:0.4.32-2ubuntu0.1
released
focal
Fixed 1:0.4.31-1ubuntu0.1
released
bionic
Fixed 1:0.4.28-1ubuntu0.1~esm1
released
xenial
Fixed 1:0.4.25-1ubuntu0.1~esm1
released