From ${URL} : Unspecified vulnerability was fixed in flac upstream repository [1] There're currently no publicly availble details about this issue: The commit above will be included in flac 1.3.1, which will be out early next week [2]. [1]: https://git.xiph.org/?p=flac.git;a=patch;h=5b3033a2b355068c11fe637e14ac742d273f076e [2]: http://lists.xiph.org/pipermail/flac-dev/2014-November/005185.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
1.3.1 added to the tree. @security: Feel free to start the stabilization process if you like.
Arches, please test and mark stable: =media-libs/flac-1.3.1 Target Keywords : "alpha amd64 arm hppa ia64 ppc ppc64 spark x86" Thank you!
CVE-2014-8962 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8962): Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
Arch teams, please test and mark stable: =media-libs/flac-1.3.1-r1 Targeted stable KEYWORDS : alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
Stable for HPPA.
sparc stable
arm stable
ppc stable
ia64 stable
amd64 stable
x86 stable
alpha stable
ppc64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
Arches and Maintainer(s), Thank you for your work. New GLSA Request filed.
This issue was resolved and addressed in GLSA 201412-40 at http://security.gentoo.org/glsa/glsa-201412-40.xml by GLSA coordinator Sean Amoss (ackle).