FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

FreeBSD -- Heap vulnerability in bspatch

Affected packages
10.3 <= FreeBSD < 10.3_6
10.2 <= FreeBSD < 10.2_20
10.1 <= FreeBSD < 10.1_37
9.3 <= FreeBSD < 9.3_45


VuXML ID 7d4f4955-600a-11e6-a6c3-14dae9d210b8
Discovery 2016-07-25
Entry 2016-08-11

Problem Description:

The implementation of bspatch does not check for a negative value on numbers of bytes read from the diff and extra streams, allowing an attacker who can control the patch file to write at arbitrary locations in the heap.

This issue was first discovered by The Chromium Project and reported independently by Lu Tung-Pin to the FreeBSD project.


An attacker who can control the patch file can cause a crash or run arbitrary code under the credentials of the user who runs bspatch, in many cases, root.


CVE Name CVE-2014-9862
FreeBSD Advisory SA-16:25.bspatch