The EbmlElement::ReadCodedSizeValue function in libEBML before 1.3.3 allows context-dependent attackers to obtain sensitive information from process heap memory via a crafted length value in an EBML id, which triggers an invalid memory access.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "libebml-dev", "binary_version": "1.3.0-2+deb8u1build0.14.04.1" }, { "binary_name": "libebml4", "binary_version": "1.3.0-2+deb8u1build0.14.04.1" }, { "binary_name": "libebml4-dbgsym", "binary_version": "1.3.0-2+deb8u1build0.14.04.1" } ] }
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "libebml-dev", "binary_version": "1.3.3-1" }, { "binary_name": "libebml4v5", "binary_version": "1.3.3-1" }, { "binary_name": "libebml4v5-dbgsym", "binary_version": "1.3.3-1" } ] }