You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p>PAM (Pluggable Authentication Modules) is an architecture allowing the separation of the development of privilege granting software from the development of secure and appropriate authentication schemes.</p>
20
+
</background>
21
+
<description>
22
+
<p>Multiple vulnerabilities have been discovered in PAM. Please review the CVE identifiers referenced below for details.</p>
23
+
</description>
24
+
<impacttype="high">
25
+
<p>Please review the referenced CVE identifiers for details.</p>
26
+
</impact>
27
+
<workaround>
28
+
<p>There is no known workaround at this time.</p>
29
+
</workaround>
30
+
<resolution>
31
+
<p>All PAM users should upgrade to the latest version:</p>
<!DOCTYPEglsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3
+
<glsaid="202505-05">
4
+
<title>Orc: Arbitrary Code Execution</title>
5
+
<synopsis>A vulnerability has been discovered in Orc, which can lead to arbitrary code execution</synopsis>
6
+
<producttype="ebuild">orc</product>
7
+
<announced>2025-05-12</announced>
8
+
<revisedcount="1">2025-05-12</revised>
9
+
<bug>937127</bug>
10
+
<access>local</access>
11
+
<affected>
12
+
<packagename="dev-lang/orc"auto="yes"arch="*">
13
+
<unaffectedrange="ge">0.4.40</unaffected>
14
+
<vulnerablerange="lt">0.4.40</vulnerable>
15
+
</package>
16
+
</affected>
17
+
<background>
18
+
<p>Orc is a library and set of tools for compiling and executing
19
+
very simple programs that operate on arrays of data. The "language"
20
+
is a generic assembly language that represents many of the features
21
+
available in SIMD architectures, including saturated addition and
22
+
subtraction, and many arithmetic operations.</p>
23
+
</background>
24
+
<description>
25
+
<p>Please review the CVE identifier referenced below for details.</p>
26
+
</description>
27
+
<impacttype="high">
28
+
<p>It is possible for a malicious third party to trigger a buffer overflow and effect code execution with the same privileges as the orc compiler is called with by feeding it with malformed orc source files.
29
+
30
+
This only affects developers and CI environments using orcc, not users of liborc.</p>
31
+
</impact>
32
+
<workaround>
33
+
<p>There is no known workaround at this time.</p>
34
+
</workaround>
35
+
<resolution>
36
+
<p>All Orc users should upgrade to the latest version:</p>
0 commit comments