FLAC: User-assisted execution of arbitrary code — GLSA 201412-40

A buffer overflow vulnerability in FLAC could lead to execution of arbitrary code or Denial of Service.

Affected packages

media-libs/flac on all architectures
Affected versions < 1.3.1-r1
Unaffected versions >= 1.3.1-r1

Background

The Free Lossless Audio Codec (FLAC) library is the reference implementation of the FLAC audio file format.

Description

A stack-based buffer overflow flaw has been discovered in FLAC.

Impact

A remote attacker could entice a user to open a specially crafted .flac file using an application linked against FLAC, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All FLAC users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-libs/flac-1.3.1-r1"
 

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.

References

Release date
December 26, 2014

Latest revision
December 26, 2014: 1

Severity
normal

Exploitable
remote

Bugzilla entries