FLAC: User-assisted execution of arbitrary code A buffer overflow vulnerability in FLAC could lead to execution of arbitrary code or Denial of Service. flac 2014-12-26 2014-12-26 530288 remote 1.3.1-r1 1.3.1-r1

The Free Lossless Audio Codec (FLAC) library is the reference implementation of the FLAC audio file format.

A stack-based buffer overflow flaw has been discovered in FLAC.

A remote attacker could entice a user to open a specially crafted .flac file using an application linked against FLAC, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

There is no known workaround at this time.

All FLAC users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/flac-1.3.1-r1"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.

CVE-2014-8962 ackle ackle