Binary diff: Heap-based buffer overflow — GLSA 202003-44

A heap-based buffer overflow in Binary diff might allow remote attackers to execute arbitrary code.

Affected packages

dev-util/bsdiff on all architectures
Affected versions < 4.3-r4
Unaffected versions >= 4.3-r4

Background

bsdiff and bspatch are tools for building and applying patches to binary files.

Description

It was discovered that the implementation of bspatch did not check for a negative value on numbers of bytes read from the diff and extra streams.

Impact

A remote attacker could entice a user to apply a specially crafted patch using bspatch, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Binary diff users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-util/bsdiff-4.3-r4"
 

References

Release date
March 19, 2020

Latest revision
March 19, 2020: 1

Severity
high

Exploitable
local, remote

Bugzilla entries