Mageia 2021-0226: libebml security update
Summary
Updated libebml packages fix security vulnerabilities:
Heap use-after-free when parsing malformed file.
A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml (CVE-2021-3405).
The mkvtoolnix, libmatroska packages have been rebuilt for the
updated libebml.
References
- https://bugs.mageia.org/show_bug.cgi?id=28278
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/7COLX6WFFOI3RIOY2IOXWASU3QKAOWKO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/
- https://www.debian.org/lts/security/2021/dla-2629
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3405
Resolution
MGASA-2021-0226 - Updated libebml packages fix security vulnerabilities
SRPMS
- 7/core/libebml-1.4.2-1.mga7
- 7/core/mkvtoolnix-32.0.0-2.1.mga7
- 7/core/libmatroska-1.5.0-2.1.mga7