Integer Overflow or Wraparound Affecting sox package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SOX-2380264
  • published26 Jan 2022
  • disclosed14 Jul 2019
  • creditUnknown

Introduced: 14 Jul 2019

CVE-2019-13590  (opens in a new tab)
CWE-190  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

There is no fixed version for sox.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound. An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.

References

CVSS Scores

version 3.1