Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 679478

Summary: media-sound/sox: multiple vulnerabilities (CVE-2019-{8354,8355,8356,8357})
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: minor CC: sound
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
See Also: https://bugs.gentoo.org/show_bug.cgi?id=711320
Whiteboard: B3 [upstream/ebuild cve]
Package list:
Runtime testing required: ---

Description GLSAMaker/CVETool Bot gentoo-dev 2019-03-05 01:01:27 UTC
CVE-2019-8357 (https://nvd.nist.gov/vuln/detail/CVE-2019-8357):
  An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows
  a NULL pointer dereference.

CVE-2019-8356 (https://nvd.nist.gov/vuln/detail/CVE-2019-8356):
  An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in
  fft4g.c is not guarded, such that it can lead to write access outside of the
  statically declared array, aka a stack-based buffer overflow.

CVE-2019-8355 (https://nvd.nist.gov/vuln/detail/CVE-2019-8355):
  An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer
  overflow on the result of multiplication fed into the lsx_valloc macro that
  wraps malloc. When the buffer is allocated, it is smaller than expected,
  leading to a heap-based buffer overflow in channels_start in remix.c.

CVE-2019-8354 (https://nvd.nist.gov/vuln/detail/CVE-2019-8354):
  An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an
  integer overflow on the result of multiplication fed into malloc. When the
  buffer is allocated, it is smaller than expected, leading to a heap-based
  buffer overflow.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-22 01:17:48 UTC

*** This bug has been marked as a duplicate of bug 711320 ***