vulnerability
FreeBSD: VID-7d4f4955-600a-11e6-a6c3-14dae9d210b8 (CVE-2014-9862): FreeBSD -- Heap vulnerability in bspatch
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Aug 11, 2016 | Dec 10, 2025 | Dec 10, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Aug 11, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025
Description
Problem Description: The implementation of bspatch does not check for a negative value on numbers of bytes read from the diff and extra streams, allowing an attacker who can control the patch file to write at arbitrary locations in the heap. This issue was first discovered by The Chromium Project and reported independently by Lu Tung-Pin to the FreeBSD project. Impact: An attacker who can control the patch file can cause a crash or run arbitrary code under the credentials of the user who runs bspatch, in many cases, root.
Solutions
freebsd-upgrade-base-10_3-release-p6freebsd-upgrade-base-10_2-release-p20freebsd-upgrade-base-10_1-release-p37freebsd-upgrade-base-9_3-release-p45
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.