CVE-2024-40897

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-40897
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-40897.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-40897
Downstream
Related
Published
2024-07-26T06:15:02Z
Modified
2025-10-21T22:39:26.427441Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.

References

Affected packages

Git / gitlab.freedesktop.org/gstreamer/orc

Affected ranges

Type
GIT
Repo
https://gitlab.freedesktop.org/gstreamer/orc
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.4.23
0.4.29
0.4.30
0.4.31
0.4.32
0.4.33
0.4.34
0.4.35
0.4.36
0.4.37
0.4.38

Other

merge-base

orc-0.*

orc-0.4.0
orc-0.4.10
orc-0.4.11
orc-0.4.12
orc-0.4.13
orc-0.4.14
orc-0.4.15
orc-0.4.16
orc-0.4.17
orc-0.4.18
orc-0.4.19
orc-0.4.2
orc-0.4.20
orc-0.4.21
orc-0.4.22
orc-0.4.23
orc-0.4.24
orc-0.4.25
orc-0.4.26
orc-0.4.27
orc-0.4.28
orc-0.4.3
orc-0.4.4
orc-0.4.5
orc-0.4.6
orc-0.4.7
orc-0.4.8
orc-0.4.9