Bug 2300010 (CVE-2024-40897) - CVE-2024-40897 orc: Stack-based buffer overflow vulnerability in ORC [NEEDINFO]
Summary: CVE-2024-40897 orc: Stack-based buffer overflow vulnerability in ORC
Keywords:
Status: NEW
Alias: CVE-2024-40897
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2300153 2300154
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-07-26 06:20 UTC by OSIDB Bzimport
Modified: 2024-10-10 13:36 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Stack-based buffer overflow vulnerability exists in orcparse.c of ORC. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.
Clone Of:
Environment:
Last Closed:
Embargoed:
ndegraef: needinfo? (mbenatto)


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:6650 0 None None None 2024-09-12 14:28:39 UTC
Red Hat Product Errata RHBA-2024:6651 0 None None None 2024-09-12 14:38:01 UTC
Red Hat Product Errata RHSA-2024:5306 0 None None None 2024-08-13 15:27:11 UTC
Red Hat Product Errata RHSA-2024:5629 0 None None None 2024-08-20 15:47:03 UTC
Red Hat Product Errata RHSA-2024:5638 0 None None None 2024-08-20 16:07:57 UTC
Red Hat Product Errata RHSA-2024:5882 0 None None None 2024-08-27 07:34:17 UTC
Red Hat Product Errata RHSA-2024:6159 0 None None None 2024-09-03 05:46:15 UTC
Red Hat Product Errata RHSA-2024:6184 0 None None None 2024-09-03 08:54:27 UTC

Description OSIDB Bzimport 2024-07-26 06:20:13 UTC
Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.

Comment 2 errata-xmlrpc 2024-08-13 15:27:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:5306 https://access.redhat.com/errata/RHSA-2024:5306

Comment 3 errata-xmlrpc 2024-08-20 15:47:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:5629 https://access.redhat.com/errata/RHSA-2024:5629

Comment 4 errata-xmlrpc 2024-08-20 16:07:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:5638 https://access.redhat.com/errata/RHSA-2024:5638

Comment 5 errata-xmlrpc 2024-08-27 07:34:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:5882 https://access.redhat.com/errata/RHSA-2024:5882

Comment 6 errata-xmlrpc 2024-09-03 05:46:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:6159 https://access.redhat.com/errata/RHSA-2024:6159

Comment 7 errata-xmlrpc 2024-09-03 08:54:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:6184 https://access.redhat.com/errata/RHSA-2024:6184


Note You need to log in before you can comment on or make changes to this bug.