Lucene search

K
mageiaGentoo FoundationMGASA-2024-0288
HistorySep 10, 2024 - 7:40 p.m.

Updated orc packages fix security vulnerability

2024-09-1019:40:31
Gentoo Foundation
advisories.mageia.org
3
orc
buffer overflow
security vulnerability
developer
compromise
unix
update

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low

Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer’s build environment. This may lead to compromise of developer machines or CI build environments. (CVE-2024-40897)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchorc< 0.4.33-1.1orc-0.4.33-1.1.mga9

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

Low