From ${URL} : KaxInternalBlock::ReadData(): Fixed an invalid memory access. When reading a block group or a simple block that uses EBML lacing the frame sizes indicated in the lacing weren't checked against the available number of bytes. If the indicated frame size was bigger than the whole block's size the parser would read beyond the end of the buffer resulting in a heap information leak. Upstream patch: https://github.com/Matroska-Org/libmatroska/commit/0a2d3e3644a7453b6513db2f9bc270f77943573f @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
already fixed in 1.4.4 I think, which is good to go stable
Arches, please test and mark stable: =media-libs/libmatroska-1.4.4 Target keywords : "alpha amd64 arm ia64 ppc ppc64 sparc x86"
amd64 stable
x86 stable
Stable for PPC64.
Stable on alpha.
ppc stable
sparc stable
arm stable
ia64 stable. Maintainer(s), please cleanup. Security, please vote.
Arches, Thank you for your work. GLSA Vote: No Maintainer(s), please drop the vulnerable version(s).
Maintainer(s), please drop the vulnerable version(s).
CVE-2015-8792 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8792): The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access.
Maintainer timeout.. cleanup complete: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=14735d715a5a582e2723a810c371281e8dd085ff