Binary diff: Heap-based buffer overflow

2020-03-19T00:00:00
ID GLSA-202003-44
Type gentoo
Reporter Gentoo Foundation
Modified 2020-03-19T00:00:00

Description

Background

bsdiff and bspatch are tools for building and applying patches to binary files.

Description

It was discovered that the implementation of bspatch did not check for a negative value on numbers of bytes read from the diff and extra streams.

Impact

A remote attacker could entice a user to apply a specially crafted patch using bspatch, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Binary diff users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-util/bsdiff-4.3-r4"