Debian Security Advisory

DLA-1705-1 sox -- LTS security update

Date Reported:
05 Mar 2019
Affected Packages:
sox
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 878809, Bug 870328.
In Mitre's CVE dictionary: CVE-2017-11332, CVE-2017-11358, CVE-2017-11359, CVE-2017-15371.
More information:

Multiple vulnerabilities have been discovered in SoX (Sound eXchange), a sound processing program:

  • CVE-2017-11332

    The startread function (wav.c) is affected by a divide-by-zero vulnerability when processing WAV file with zero channel count. This flaw might be leveraged by remote attackers using a crafted WAV file to perform denial of service (application crash).

  • CVE-2017-11358

    The read_samples function (hcom.c) is affected by an invalid memory read vulnerability when processing HCOM files with invalid dictionnaries. This flaw might be leveraged by remote attackers using a crafted HCOM file to perform denial of service (application crash).

  • CVE-2017-11359

    The wavwritehdr function (wav.c) is affected by a divide-by-zero vulnerability when processing WAV files with invalid channel count over 16 bits. This flaw might be leveraged by remote attackers using a crafted WAV file to perform denial of service (application crash).

  • CVE-2017-15371

    The sox_append_comment() function (formats.c) is vulnerable to a reachable assertion when processing FLAC files with metadata declaring more comments than provided. This flaw might be leveraged by remote attackers using crafted FLAC data to perform denial of service (application crash).

For Debian 8 Jessie, these problems have been fixed in version 14.4.1-5+deb8u3.

We recommend that you upgrade your sox packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS