CVE-2019-13590

NameCVE-2019-13590
DescriptionAn issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3315-1, ELA-798-1
Debian Bugs932082

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sox (PTS)jessie, jessie (lts)14.4.1-5+deb8u7fixed
stretch (lts), stretch14.4.1-5+deb9u5fixed
buster (security), buster, buster (lts)14.4.2+git20190427-1+deb10u3fixed
bullseye (security), bullseye14.4.2+git20190427-2+deb11u2fixed
bookworm14.4.2+git20190427-3.5fixed
sid, trixie14.4.2+git20190427-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
soxsourcewheezy(unfixed)end-of-life
soxsourcejessie14.4.1-5+deb8u5ELA-798-1
soxsourcestretch14.4.1-5+deb9u3ELA-798-1
soxsourcebuster14.4.2+git20190427-1+deb10u1DLA-3315-1
soxsource(unstable)14.4.2+git20190427-2low932082

Notes

https://sourceforge.net/p/sox/bugs/325/
https://sourceforge.net/p/sox/code/ci/7b6a889217d62ed7e28188621403cc7542fd1f7e/

Search for package or bug name: Reporting problems