<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for sox is now available for openEuler-22.03-LTS-SP4,openEuler-24.03-LTS-SP1,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1020</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-01-10</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-01-10</InitialReleaseDate>
		<CurrentReleaseDate>2025-01-10</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-01-10</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">sox security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for sox is now available for openEuler-22.03-LTS-SP4,openEuler-24.03-LTS-SP1,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">SoX is a cross-platform (Windows, Linux, MacOS X, etc.) command line utility that can convert various formats of computer audio files in to other formats. It can also apply various effects to these sound files, and, as an added bonus, SoX can play and record audio files on most platforms.

Security Fix(es):

An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.(CVE-2019-13590)

An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.(CVE-2019-8354)

An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.(CVE-2019-8355)

An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.(CVE-2019-8356)

An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.(CVE-2019-8357)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for sox is now available for openEuler-22.03-LTS-SP4,openEuler-24.03-LTS-SP1,openEuler-22.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-24.03-LTS.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">sox</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1020</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2019-13590</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2019-8354</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2019-8355</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2019-8356</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2019-8357</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-13590</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-8354</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-8355</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-8356</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2019-8357</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-14.4.2.0-31.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-debuginfo-14.4.2.0-31.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-debugsource-14.4.2.0-31.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-devel-14.4.2.0-31.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-14.4.2.0-31.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-debuginfo-14.4.2.0-31.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-debugsource-14.4.2.0-31.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-devel-14.4.2.0-31.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-14.4.2.0-31.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-debuginfo-14.4.2.0-31.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-debugsource-14.4.2.0-31.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-devel-14.4.2.0-31.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-14.4.2.0-31.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-debuginfo-14.4.2.0-31.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-debugsource-14.4.2.0-31.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-devel-14.4.2.0-31.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-14.4.2.0-31.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-debuginfo-14.4.2.0-31.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-debugsource-14.4.2.0-31.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-devel-14.4.2.0-31.oe2203sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-14.4.2.0-31.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-debuginfo-14.4.2.0-31.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-debugsource-14.4.2.0-31.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-devel-14.4.2.0-31.oe2403.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="sox-help-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-help-14.4.2.0-31.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="sox-help-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-help-14.4.2.0-31.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="sox-help-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-help-14.4.2.0-31.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="sox-help-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-help-14.4.2.0-31.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="sox-help-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-help-14.4.2.0-31.oe2203sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="sox-help-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-help-14.4.2.0-31.oe2403.noarch.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-14.4.2.0-31.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-debuginfo-14.4.2.0-31.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-debugsource-14.4.2.0-31.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-devel-14.4.2.0-31.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-14.4.2.0-31.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-debuginfo-14.4.2.0-31.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-debugsource-14.4.2.0-31.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-devel-14.4.2.0-31.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-14.4.2.0-31.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-debuginfo-14.4.2.0-31.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-debugsource-14.4.2.0-31.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-devel-14.4.2.0-31.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-14.4.2.0-31.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-debuginfo-14.4.2.0-31.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-debugsource-14.4.2.0-31.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-devel-14.4.2.0-31.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-14.4.2.0-31.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-debuginfo-14.4.2.0-31.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-debugsource-14.4.2.0-31.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-devel-14.4.2.0-31.oe2203sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-14.4.2.0-31.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debuginfo-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-debuginfo-14.4.2.0-31.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-debugsource-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-debugsource-14.4.2.0-31.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="sox-devel-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-devel-14.4.2.0-31.oe2403.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">sox-14.4.2.0-31.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">sox-14.4.2.0-31.oe2403sp1.src.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">sox-14.4.2.0-31.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">sox-14.4.2.0-31.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">sox-14.4.2.0-31.oe2203sp1.src.rpm</FullProductName>
			<FullProductName ProductID="sox-14.4.2.0-31" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">sox-14.4.2.0-31.oe2403.src.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.</Note>
		</Notes>
		<ReleaseDate>2025-01-10</ReleaseDate>
		<CVE>CVE-2019-13590</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.5</BaseScore>
				<Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>sox security update</Description>
				<DATE>2025-01-10</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1020</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.</Note>
		</Notes>
		<ReleaseDate>2025-01-10</ReleaseDate>
		<CVE>CVE-2019-8354</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.0</BaseScore>
				<Vector>AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>sox security update</Description>
				<DATE>2025-01-10</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1020</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.</Note>
		</Notes>
		<ReleaseDate>2025-01-10</ReleaseDate>
		<CVE>CVE-2019-8355</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.5</BaseScore>
				<Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>sox security update</Description>
				<DATE>2025-01-10</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1020</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.</Note>
		</Notes>
		<ReleaseDate>2025-01-10</ReleaseDate>
		<CVE>CVE-2019-8356</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.5</BaseScore>
				<Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>sox security update</Description>
				<DATE>2025-01-10</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1020</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.</Note>
		</Notes>
		<ReleaseDate>2025-01-10</ReleaseDate>
		<CVE>CVE-2019-8357</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.5</BaseScore>
				<Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>sox security update</Description>
				<DATE>2025-01-10</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1020</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>