Name | CVE-2019-13590 |
Description | An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3315-1, ELA-798-1 |
Debian Bugs | 932082 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
sox (PTS) | jessie, jessie (lts) | 14.4.1-5+deb8u7 | fixed |
stretch (lts), stretch | 14.4.1-5+deb9u5 | fixed | |
buster (security), buster, buster (lts) | 14.4.2+git20190427-1+deb10u3 | fixed | |
bullseye (security), bullseye | 14.4.2+git20190427-2+deb11u2 | fixed | |
bookworm | 14.4.2+git20190427-3.5 | fixed | |
sid, trixie | 14.4.2+git20190427-5 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
sox | source | wheezy | (unfixed) | end-of-life | ||
sox | source | jessie | 14.4.1-5+deb8u5 | ELA-798-1 | ||
sox | source | stretch | 14.4.1-5+deb9u3 | ELA-798-1 | ||
sox | source | buster | 14.4.2+git20190427-1+deb10u1 | DLA-3315-1 | ||
sox | source | (unstable) | 14.4.2+git20190427-2 | low | 932082 |
https://sourceforge.net/p/sox/bugs/325/
https://sourceforge.net/p/sox/code/ci/7b6a889217d62ed7e28188621403cc7542fd1f7e/