Bug 1305463 (CVE-2014-9765) - CVE-2014-9765 xdelta: buffer overflow in main_get_appheader
Summary: CVE-2014-9765 xdelta: buffer overflow in main_get_appheader
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2014-9765
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1305464
Blocks: 1305468
TreeView+ depends on / blocked
 
Reported: 2016-02-08 10:37 UTC by Adam Mariš
Modified: 2019-09-29 13:43 UTC (History)
3 users (show)

Fixed In Version: xdelta 3.0.9
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-05-27 10:03:08 UTC


Attachments (Terms of Use)

Description Adam Mariš 2016-02-08 10:37:40 UTC
A buffer overflow vulnerability in xdelta3 was reported, allowing arbitrary code execution from input files on some systems.

Upstream patch:

https://github.com/jmacd/xdelta/commit/969e65d3a5d70442f5bafd726bcef47a0b48edd8

Comment 1 Adam Mariš 2016-02-08 10:37:59 UTC
Fedora 23, package xdelta, is not vulnerable because it currently has xdelta-3.0.9-1.fc23 in stable

Comment 2 Adam Mariš 2016-02-08 10:39:18 UTC
Created xdelta tracking bugs for this issue:

Affects: fedora-22 [bug 1305464]

Comment 3 Andrej Nemec 2016-02-22 08:41:56 UTC
External references:

(none)

Comment 4 Tomas Hoger 2016-05-27 10:03:08 UTC
Currently no plan to address this in Red Hat Enterprise Linux 7.  xdelta is a leaf package, not required/used by other distribution components.


Note You need to log in before you can comment on or make changes to this bug.