First published: Fri Jul 26 2024(Updated: )
Last updated 1 October 2024
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
debian/orc | <=1:0.4.32-1<=1:0.4.33-2 | 1:0.4.40-1 |
GStreamer | <0.4.39 |
https://gitlab.freedesktop.org/gstreamer/orc/-/commit/fb7db9ae3e8ac271651d1884a3611d30bac04a98
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40897 is classified as a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-40897, upgrade to ORC version 0.4.40 or later.
CVE-2024-40897 affects ORC versions prior to 0.4.39.
CVE-2024-40897 is a stack-based buffer overflow vulnerability.
Exploitation of CVE-2024-40897 could allow an attacker to execute arbitrary code on the developer's build environment.