Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 937127 (CVE-2024-40897) - <dev-lang/orc-0.4.40: Stack-based buffer overflow when formatting error messages for certain input files.
Summary: <dev-lang/orc-0.4.40: Stack-based buffer overflow when formatting error messa...
Status: IN_PROGRESS
Alias: CVE-2024-40897
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major
Assignee: Gentoo Security
URL: https://gstreamer.freedesktop.org/sec...
Whiteboard: C1 [glsa? cleanup]
Keywords:
Depends on: 948199
Blocks:
  Show dependency tree
 
Reported: 2024-08-02 13:44 UTC by Christopher Fore
Modified: 2025-02-09 06:48 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-08-02 13:44:50 UTC
CVE-2024-40897:

It is possible for a malicious third party to trigger a buffer overflow and effect code execution with the same privileges as the orc compiler is called with by feeding it with malformed orc source files.

This only affects developers and CI environments using orcc, not users of liborc.


The above is fixed in 0.4.39.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2025-01-16 19:06:37 UTC
commit 33b5a3b025e5bb328f3c561348d286421349c2b4
Author: Sam James <sam@gentoo.org>
Date:   Sat Jan 4 21:50:42 2025 +0000

    dev-lang/orc: add 0.4.40

    Signed-off-by: Sam James <sam@gentoo.org>