Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 937127 (CVE-2024-40897) - dev-lang/orc: Stack-based buffer overflow when formatting error messages for certain input files.
Summary: dev-lang/orc: Stack-based buffer overflow when formatting error messages for ...
Status: CONFIRMED
Alias: CVE-2024-40897
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major
Assignee: Gentoo Security
URL: https://gstreamer.freedesktop.org/sec...
Whiteboard: C1 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2024-08-02 13:44 UTC by Christopher Fore
Modified: 2024-08-02 13:46 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-08-02 13:44:50 UTC
CVE-2024-40897:

It is possible for a malicious third party to trigger a buffer overflow and effect code execution with the same privileges as the orc compiler is called with by feeding it with malformed orc source files.

This only affects developers and CI environments using orcc, not users of liborc.


The above is fixed in 0.4.39.