First published: Fri Feb 15 2019(Updated: )
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sound Exchange Project Sound Exchange | =14.4.2 | |
debian/sox | 14.4.2+git20190427-2+deb11u2 14.4.2+git20190427-3.5 14.4.2+git20190427-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8355 is a vulnerability in SoX (Sound Exchange) 14.4.2, which allows for a heap-based buffer overflow in remix.c due to an integer overflow in xmalloc.h.
CVE-2019-8355 has a severity rating of 5.5 out of 10, classified as medium severity.
The affected software for CVE-2019-8355 includes SoX 14.4.2 and various Ubuntu and Debian packages.
To fix CVE-2019-8355, update SoX to version 14.4.2+ or apply the relevant security patches for the affected Ubuntu and Debian packages.
You can find more information about CVE-2019-8355 in the Debian LTS announcement, the SoX bug tracker, and the Ubuntu Security Notice.