Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#65971 - [bsdiff] [security] Unpatched integer range vulnerbilities

Attached to Project: Arch Linux
Opened by Mingye Wang (arthur2e5) - Wednesday, 25 March 2020, 07:15 GMT
Last edited by Kyle Keen (keenerd) - Wednesday, 25 March 2020, 20:20 GMT
Task Type Bug Report
Category Packages: Extra
Status Assigned   Reopened
Assigned To Kyle Keen (keenerd)
Levente Polyak (anthraxx)
Architecture All
Severity Medium
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 0%
Votes 0
Private No

Details

Description:
bsdiff (4.3-9) as currently packaged by Arch Linux is susceptible to a number of old vulnerbilities.

Links to vulnerbilities and patches:
* CVE-2014-9862. See https://security.freebsd.org/advisories/FreeBSD-SA-16:25.bsp for patch.
* Integer overflow detected by ChromeOS fuzzer. See https://github.com/freebsd/freebsd/commit/d0260bc2831cae2689042b07f26b575bd6e5f65a for patch and https://android.googlesource.com/platform/external/bsdiff/+/6e40d9347586f0bc628295a0c581c95eeae0a234%5E%21/ for ChromeOS version.
* Unnamed memory corruption in FreeBSD. See https://github.com/freebsd/freebsd/commit/59381119a4c0b13088daea263ddd543d9bba5a16#diff-e337a2befd51c9e5715355c2fcbab673 for patch and https://gist.github.com/anonymous/e48209b03f1dd9625a992717e7b89c4f for exploit.

Steps to reproduce:
See links.
This task depends upon

Comment by Mingye Wang (arthur2e5) - Wednesday, 25 March 2020, 07:47 GMT

Loading...