Debian: DSA-3538-1: libebml security update
Summary
CVE-2015-8789
Context-dependent attackers could trigger a use-after-free
vulnerability by providing a maliciously crafted EBML document.
CVE-2015-8790
Context-dependent attackers could obtain sensitive information
from the process' heap memory by using a maliciously crafted UTF-8
string.
CVE-2015-8791
Context-dependent attackers could obtain sensitive information
from the process' heap memory by using a maliciously crafted
length value in an EBML id.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.2.2-2+deb7u1.
For the stable distribution (jessie), these problems have been fixed in
version 1.3.0-2+deb8u1.
For the testing (stretch) and unstable (sid) distributions, these
problems have been fixed in version 1.3.3-1.
We recommend that you upgrade your libebml packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org