FS#42898 - [flac] Arbitrary code execution (CVE-2014-8962 CVE-2014-9028)
Attached to Project:
Arch Linux
Opened by Remi Gacogne (rgacogne) - Tuesday, 25 November 2014, 16:35 GMT
Last edited by Eric Belanger (Snowman) - Wednesday, 26 November 2014, 02:03 GMT
Opened by Remi Gacogne (rgacogne) - Tuesday, 25 November 2014, 16:35 GMT
Last edited by Eric Belanger (Snowman) - Wednesday, 26 November 2014, 02:03 GMT
|
Details
Two issues (a heap overflow [1] and a stack overflow [2])
has been found [3] in flac, resulting in arbitrary code
execution by parsing a malicious .flac file.
I believe it would make sense to backport the fixes if a 1.3.1 version is not released soon. [1] https://git.xiph.org/?p=flac.git;a=commit;h=fcf0ba06ae12ccd7c67cee3c8d948df15f946b85 [2] https://git.xiph.org/?p=flac.git;a=commit;h=5b3033a2b355068c11fe637e14ac742d273f076e [3] http://www.ocert.org/advisories/ocert-2014-008.html |
This task depends upon
Closed by Eric Belanger (Snowman)
Wednesday, 26 November 2014, 02:03 GMT
Reason for closing: Fixed
Additional comments about closing: flac-1.3.0-5
Wednesday, 26 November 2014, 02:03 GMT
Reason for closing: Fixed
Additional comments about closing: flac-1.3.0-5