Package        : bsdiff
Version        : 4.3-15+deb8u1
CVE ID         : CVE-2014-9862


An issue in bsdiff, a tool to generate/apply a patch between two binary 
files, has been found.

Using a crafted patch file an integer signedness error in bspatch could be 
used for a heap based buffer overflow and possibly execution of arbitrary 
code.


For Debian 8 "Jessie", this problem has been fixed in version
4.3-15+deb8u1.

We recommend that you upgrade your bsdiff packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2010-1: bsdiff security update

November 26, 2019
An issue in bsdiff, a tool to generate/apply a patch between two binary files, has been found

Summary

Using a crafted patch file an integer signedness error in bspatch could be
used for a heap based buffer overflow and possibly execution of arbitrary
code.


For Debian 8 "Jessie", this problem has been fixed in version
4.3-15+deb8u1.

We recommend that you upgrade your bsdiff packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : bsdiff
Version : 4.3-15+deb8u1
CVE ID : CVE-2014-9862

Related News