|
|
Subscribe / Log in / New account

libebml: multiple vulnerabilities

Package(s):libebml CVE #(s):
Created:November 6, 2015 Updated:January 15, 2016
Description:

From the Mageia advisory:

In EbmlMaster::Read() in libebml before 1.3.3, when the parser encountered a deeply nested element with an infinite size then a following element of an upper level was not propagated correctly. Instead the element with the infinite size was added into the EBML element tree a second time resulting in memory access after freeing it and multiple attempts to free the same memory address during destruction (TALOS-CAN-0037).

In EbmlUnicodeString::UpdateFromUTF8() in libebml before 1.3.3, when reading from a UTF-8 string in which the length indicated by a UTF-8 character's first byte exceeds the string's actual number of bytes the parser would access beyond the end of the string resulting in a heap information leak (TALOS-CAN-0036).

Alerts:
openSUSE openSUSE-SU-2016:0125-1 libebml, libmatroska 2016-01-14
Mageia MGASA-2015-0430 libebml 2015-11-05

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds