- -------------------------------------------------------------------------
Debian Security Advisory DSA-3538-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
March 31, 2016                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libebml
CVE ID         : CVE-2015-8789 CVE-2015-8790 CVE-2015-8791

Several vulnerabilities were discovered in libebml, a library for
manipulating Extensible Binary Meta Language files.

CVE-2015-8789

    Context-dependent attackers could trigger a use-after-free
    vulnerability by providing a maliciously crafted EBML document.

CVE-2015-8790

    Context-dependent attackers could obtain sensitive information
    from the process' heap memory by using a maliciously crafted UTF-8
    string.

CVE-2015-8791

    Context-dependent attackers could obtain sensitive information
    from the process' heap memory by using a maliciously crafted
    length value in an EBML id.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.2.2-2+deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 1.3.0-2+deb8u1.

For the testing (stretch) and unstable (sid) distributions, these
problems have been fixed in version 1.3.3-1.

We recommend that you upgrade your libebml packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-3538-1: libebml security update

March 31, 2016
Several vulnerabilities were discovered in libebml, a library for manipulating Extensible Binary Meta Language files

Summary

CVE-2015-8789

Context-dependent attackers could trigger a use-after-free
vulnerability by providing a maliciously crafted EBML document.

CVE-2015-8790

Context-dependent attackers could obtain sensitive information
from the process' heap memory by using a maliciously crafted UTF-8
string.

CVE-2015-8791

Context-dependent attackers could obtain sensitive information
from the process' heap memory by using a maliciously crafted
length value in an EBML id.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.2.2-2+deb7u1.

For the stable distribution (jessie), these problems have been fixed in
version 1.3.0-2+deb8u1.

For the testing (stretch) and unstable (sid) distributions, these
problems have been fixed in version 1.3.3-1.

We recommend that you upgrade your libebml packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Several vulnerabilities were discovered in libebml, a library for
manipulating Extensible Binary Meta Language files.

Related News