Summary: | <media-libs/flac-1.3.1-r1: Stack-based buffer overflow in stream_decoder.c (CVE-2014-8962) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | alexander, karl.j.linden, sound |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1167236 | ||
Whiteboard: | A2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 530920 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-11-24 09:38:09 UTC
1.3.1 added to the tree. @security: Feel free to start the stabilization process if you like. Arches, please test and mark stable: =media-libs/flac-1.3.1 Target Keywords : "alpha amd64 arm hppa ia64 ppc ppc64 spark x86" Thank you! CVE-2014-8962 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8962): Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file. Arch teams, please test and mark stable: =media-libs/flac-1.3.1-r1 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 Stable for HPPA. sparc stable arm stable ppc stable ia64 stable amd64 stable x86 stable alpha stable ppc64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. Arches and Maintainer(s), Thank you for your work. New GLSA Request filed. This issue was resolved and addressed in GLSA 201412-40 at http://security.gentoo.org/glsa/glsa-201412-40.xml by GLSA coordinator Sean Amoss (ackle). |