DSA-3484-1 xdelta3 -- security update

Related Vulnerabilities: CVE-2014-9765  

Stepan Golosunov discovered that xdelta3, a diff utility which works with binary files, is affected by a buffer overflow vulnerability within the main_get_appheader function, which may lead to the execution of arbitrary code. For the oldstable distribution (wheezy), this problem has been fixed in version 3.0.0.dfsg-1+deb7u1. For the stable distribution (jessie), this problem has been fixed in version 3.0.8-dfsg-1+deb8u1. For the testing distribution (stretch), this problem has been fixed in version 3.0.8-dfsg-1.1. For the unstable distribution (sid), this problem has been fixed in version 3.0.8-dfsg-1.1. We recommend that you upgrade your xdelta3 packages.

Debian Security Advisory

DSA-3484-1 xdelta3 -- security update

Date Reported:
19 Feb 2016
Affected Packages:
xdelta3
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 814067.
In Mitre's CVE dictionary: CVE-2014-9765.
More information:

Stepan Golosunov discovered that xdelta3, a diff utility which works with binary files, is affected by a buffer overflow vulnerability within the main_get_appheader function, which may lead to the execution of arbitrary code.

For the oldstable distribution (wheezy), this problem has been fixed in version 3.0.0.dfsg-1+deb7u1.

For the stable distribution (jessie), this problem has been fixed in version 3.0.8-dfsg-1+deb8u1.

For the testing distribution (stretch), this problem has been fixed in version 3.0.8-dfsg-1.1.

For the unstable distribution (sid), this problem has been fixed in version 3.0.8-dfsg-1.1.

We recommend that you upgrade your xdelta3 packages.