Описание
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| libebml | fixed | 1.4.5-1 | package | |
| libebml | fixed | 1.4.4-1+deb12u1 | bookworm | package |
| libebml | no-dsa | buster | package |
Примечания
https://github.com/Matroska-Org/libebml/issues/147
https://github.com/Matroska-Org/libebml/pull/148
https://github.com/Matroska-Org/libebml/commit/4d577f5c3e267b2988d56dafebc82dedb4c45506 (master)
https://github.com/Matroska-Org/libebml/commit/4c0d757d6de529e8dda6bb6ca08369d5f9bffdb3 (release-1.4.5)
EPSS
Связанные уязвимости
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
In libebml before 1.4.5, an integer overflow in MemIOCallback.cpp can occur when reading or writing. It may result in buffer overflows.
Уязвимость файла MemIOCallback.cpp библиотеки C++ libebml, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
EPSS