Out-of-bounds Write Affecting sox package, versions <14.4.1-5+deb9u2
Threat Intelligence
EPSS
0.15% (52nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-SOX-337447
- published 16 Feb 2019
- disclosed 15 Feb 2019
How to fix?
Upgrade Debian:9 sox to version 14.4.1-5+deb9u2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream sox package and not the sox package as distributed by Debian.
See How to fix? for Debian:9 relevant fixed versions and status.
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
References
- https://security-tracker.debian.org/tracker/CVE-2019-8355
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8355
- https://lists.debian.org/debian-lts-announce/2019/05/msg00040.html
- https://sourceforge.net/p/sox/bugs/320
- https://usn.ubuntu.com/4079-1/
- https://usn.ubuntu.com/4079-2/
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-8355