First published: Tue Sep 15 2020(Updated: )
It was discovered that bsdiff mishandled certain input. If a user were tricked into opening a malicious file, an attacker could cause bsdiff to crash or potentially execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/bsdiff | <4.3-15+deb8u1build0.16.04.1 | 4.3-15+deb8u1build0.16.04.1 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4500-1 is considered high due to the potential for crashing or executing arbitrary code.
To fix USN-4500-1, upgrade the bsdiff package to version 4.3-15+deb8u1build0.16.04.1 or later.
USN-4500-1 affects Ubuntu 16.04 systems that have the vulnerable bsdiff package installed.
USN-4500-1 addresses a vulnerability in bsdiff that allows for input mishandling leading to potential crashes or code execution.
Yes, the exploit for USN-4500-1 requires user interaction, specifically opening a malicious file.