First published: Sun Jul 14 2019(Updated: )
An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sound Exchange Project Sound Exchange | =14.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13590 is an issue in libsox.a in SoX 14.4.2 that involves an integer overflow vulnerability.
The severity of CVE-2019-13590 is medium with a CVSS score of 5.5.
CVE-2019-13590 affects SoX version 14.4.2.
To fix the vulnerability in SoX, you should update to a version that does not contain the vulnerability, if available.
You can find more information about CVE-2019-13590 at the following references: [Link 1](https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html), [Link 2](https://sourceforge.net/p/sox/bugs/325/).