MGASA-2024-0288

Source
https://advisories.mageia.org/MGASA-2024-0288.html
Import Source
https://advisories.mageia.org/MGASA-2024-0288.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0288
Related
Published
2024-09-10T16:40:31Z
Modified
2024-09-10T16:12:43Z
Summary
Updated orc packages fix security vulnerability
Details

Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments. (CVE-2024-40897)

References
Credits

Affected packages

Mageia:9 / orc

Package

Name
orc
Purl
pkg:rpm/mageia/orc?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.33-1.1.mga9

Ecosystem specific

{
    "section": "core"
}