-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-4023-1 [email protected] https://www.debian.org/lts/security/ Adrian Bunk January 20, 2025 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : libebml Version : 1.4.2-1+deb11u1 CVE ID : CVE-2023-52339 An integer overflow in MemIOCallback::read() has been fixed in libebml, a library for the EBML (Extensible Binary Meta Language) format. For Debian 11 bullseye, this problem has been fixed in version 1.4.2-1+deb11u1. We recommend that you upgrade your libebml packages. For the detailed security status of libebml please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libebml Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmeOWCMACgkQiNJCh6LY mLGm9RAAnexTAwvmOvVce/D5vMMW6wlFTYFFISr8G75ksmHWUSS/NGoKv0OsqSNp B3yqkiaOpr7aghwUChpB8bR13IVyl8CuLldbCnz96OVY3YwUmMtLMOOkAYxxxq+C EOYyhnsaGkyx7xZ4FoeT3QusuP0/q79V09zLQZ0xvrA9vjiZvaeX2TjuZdJiLN1y CP/92Ciznl/q8jmcMd2RZo2sVE7ifjT2xFMbW+bfSNjmDPxq26hwszKRVN2NtYpF unw6NAowq7eR/imIth0KJ1cVT+EizHGR/rvuL+MPLt5zKyZE5YtMeni/szp2abBz 8pQ945MTp8dvwzZttNOfr9cDUbHAsa05GRp8sdbxV6SbfQbCv2IUuLkqtzX8no4o kL2k3sdOFO8CzYYy+QYZaEJA7BHsWjWAmIgGYtkLmhTo4BVyvDb0+Fnv8SQMO1Cf LudEFbwbclBsKoPdHoGSFkf26TW+QRdgLWMzJ/YC0bRliVCarNl2hmRQYY8HPiJr ZEQ5XINU0nexLylHlkfZKgxhqJYQuEsXsQ9peYPoFMNZ9dnEwJpzHLFOEZsHWEXv xKuQvyHrDc1dsE7EgiiaFojfbHDB+dxQwCa3Oq0Fp4vcNxTK9VAx1stBwvjmpAfM Sq7VGT3J2sscnBGBg9KPLA/4hcwIZFkNXx3XYTUWaF5Q24OT/jI= =7UgL -----END PGP SIGNATURE-----
