Debian Security Advisory
DLA-3315-1 sox -- LTS security update
- Date Reported:
- 10 Feb 2023
- Affected Packages:
- sox
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 933372, Bug 1010374, Bug 1012138, Bug 1012516, Bug 1021133, Bug 1021134, Bug 1021135.
In Mitre's CVE dictionary: CVE-2019-13590, CVE-2021-3643, CVE-2021-23159, CVE-2021-23172, CVE-2021-23210, CVE-2021-33844, CVE-2021-40426, CVE-2022-31650, CVE-2022-31651. - More information:
-
This update fixes multiple file format validation vulnerabilities that could result in memory access violations such as buffer overflows and floating point exceptions. It also fixes a regression in hcom parsing introduced when fixing CVE-2017-11358.
- CVE-2019-13590
In
sox-fmt.h
(startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into thelsx_calloc
macro that wrapsmalloc
. When aNULL
pointer is returned, it is used without a prior check that it is a valid pointer, leading to aNULL
pointer dereference onlsx_readbuf
informats_i.c
. - CVE-2021-3643
The
lsx_adpcm_init
function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information. - CVE-2021-23159
A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function
lsx_read_w_buf()
informats_i.c
file. The vulnerability is exploitable with a crafted file, that could cause an application to crash. - CVE-2021-23172
A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function
startread()
inhcom.c
file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash. - CVE-2021-23210
A floating point exception (divide-by-zero) issue was discovered in SoX in functon
read_samples()
ofvoc.c
file. An attacker with a crafted file, could cause an application to crash. - CVE-2021-33844
A floating point exception (divide-by-zero) issue was discovered in SoX in functon
startread()
ofwav.c
file. An attacker with a crafted wav file, could cause an application to crash. - CVE-2021-40426
A heap-based buffer overflow vulnerability exists in the
sphere.c
start_read()
functionality of Sound Exchange libsox. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. - CVE-2022-31650
There is a floating-point exception in
lsx_aiffstartwrite
inaiff.c
. - CVE-2022-31651
There is an assertion failure in
rate_init
inrate.c
.
For Debian 10 buster, these problems have been fixed in version 14.4.2+git20190427-1+deb10u1.
We recommend that you upgrade your sox packages.
For the detailed security status of sox please refer to its security tracker page at: https://security-tracker.debian.org/tracker/sox
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2019-13590