Joined: 12 May 2004
|Posted: Thu Mar 19, 2020 10:26 pm Post subject: [ GLSA 202003-44 ] Binary diff
|Gentoo Linux Security Advisory
Title: Binary diff: Heap-based buffer overflow (GLSA 202003-44)
Exploitable: local, remote
A heap-based buffer overflow in Binary diff might allow remote
attackers to execute arbitrary code.
bsdiff and bspatch are tools for building and applying patches to binary
Vulnerable: < 4.3-r4
Unaffected: >= 4.3-r4
Architectures: All supported architectures
It was discovered that the implementation of bspatch did not check for a
negative value on numbers of bytes read from the diff and extra streams.
A remote attacker could entice a user to apply a specially crafted patch
using bspatch, possibly resulting in execution of arbitrary code with the
privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All Binary diff users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-util/bsdiff-4.3-r4"