A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
No link to upstream report, or patch, or anything, but sphere.c doesn't seem to have been touched since 2014.
A flaw was found in sox 14.4.1. The lsx_adpcm_init function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information.
According to the Redhat bug, CVE-2021-23210 (a DoS) also affects Sox.
In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwrite in aiff.c in libsox.a.
In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.
Found by fuzzing.