CVE-2019-13590

NameCVE-2019-13590
DescriptionAn issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3315-1
Debian Bugs932082

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sox (PTS)buster14.4.2+git20190427-1vulnerable
buster (security)14.4.2+git20190427-1+deb10u3fixed
bullseye (security), bullseye14.4.2+git20190427-2+deb11u2fixed
bookworm14.4.2+git20190427-3.5fixed
sid, trixie14.4.2+git20190427-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
soxsourcebuster14.4.2+git20190427-1+deb10u1DLA-3315-1
soxsource(unstable)14.4.2+git20190427-2low932082

Notes

https://sourceforge.net/p/sox/bugs/325/
https://sourceforge.net/p/sox/code/ci/7b6a889217d62ed7e28188621403cc7542fd1f7e/

Search for package or bug name: Reporting problems