{"schema_version":"1.7.2","id":"OESA-2025-1020","modified":"2025-08-13T07:23:00Z","published":"2025-01-10T01:46:49Z","upstream":["CVE-2019-13590","CVE-2019-8354","CVE-2019-8355","CVE-2019-8356","CVE-2019-8357"],"summary":"sox security update","details":"SoX is a cross-platform (Windows, Linux, MacOS X, etc.) command line utility that can convert various formats of computer audio files in to other formats. It can also apply various effects to these sound files, and, as an added bonus, SoX can play and record audio files on most platforms.\n\nSecurity Fix(es):\n\nAn issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.(CVE-2019-13590)\n\nAn issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.(CVE-2019-8354)\n\nAn issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.(CVE-2019-8355)\n\nAn issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.(CVE-2019-8356)\n\nAn issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.(CVE-2019-8357)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"sox","purl":"pkg:rpm/openEuler/sox&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14.4.2.0-31.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["sox-14.4.2.0-31.oe2203sp4.aarch64.rpm","sox-debuginfo-14.4.2.0-31.oe2203sp4.aarch64.rpm","sox-debugsource-14.4.2.0-31.oe2203sp4.aarch64.rpm","sox-devel-14.4.2.0-31.oe2203sp4.aarch64.rpm"],"noarch":["sox-help-14.4.2.0-31.oe2203sp4.noarch.rpm"],"src":["sox-14.4.2.0-31.oe2203sp4.src.rpm"],"x86_64":["sox-14.4.2.0-31.oe2203sp4.x86_64.rpm","sox-debuginfo-14.4.2.0-31.oe2203sp4.x86_64.rpm","sox-debugsource-14.4.2.0-31.oe2203sp4.x86_64.rpm","sox-devel-14.4.2.0-31.oe2203sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS-SP1","name":"sox","purl":"pkg:rpm/openEuler/sox&distro=openEuler-24.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14.4.2.0-31.oe2403sp1"}]}],"ecosystem_specific":{"aarch64":["sox-14.4.2.0-31.oe2403sp1.aarch64.rpm","sox-debuginfo-14.4.2.0-31.oe2403sp1.aarch64.rpm","sox-debugsource-14.4.2.0-31.oe2403sp1.aarch64.rpm","sox-devel-14.4.2.0-31.oe2403sp1.aarch64.rpm"],"noarch":["sox-help-14.4.2.0-31.oe2403sp1.noarch.rpm"],"src":["sox-14.4.2.0-31.oe2403sp1.src.rpm"],"x86_64":["sox-14.4.2.0-31.oe2403sp1.x86_64.rpm","sox-debuginfo-14.4.2.0-31.oe2403sp1.x86_64.rpm","sox-debugsource-14.4.2.0-31.oe2403sp1.x86_64.rpm","sox-devel-14.4.2.0-31.oe2403sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP3","name":"sox","purl":"pkg:rpm/openEuler/sox&distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14.4.2.0-31.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["sox-14.4.2.0-31.oe2203sp3.aarch64.rpm","sox-debuginfo-14.4.2.0-31.oe2203sp3.aarch64.rpm","sox-debugsource-14.4.2.0-31.oe2203sp3.aarch64.rpm","sox-devel-14.4.2.0-31.oe2203sp3.aarch64.rpm"],"noarch":["sox-help-14.4.2.0-31.oe2203sp3.noarch.rpm"],"src":["sox-14.4.2.0-31.oe2203sp3.src.rpm"],"x86_64":["sox-14.4.2.0-31.oe2203sp3.x86_64.rpm","sox-debuginfo-14.4.2.0-31.oe2203sp3.x86_64.rpm","sox-debugsource-14.4.2.0-31.oe2203sp3.x86_64.rpm","sox-devel-14.4.2.0-31.oe2203sp3.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"sox","purl":"pkg:rpm/openEuler/sox&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14.4.2.0-31.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["sox-14.4.2.0-31.oe2003sp4.aarch64.rpm","sox-debuginfo-14.4.2.0-31.oe2003sp4.aarch64.rpm","sox-debugsource-14.4.2.0-31.oe2003sp4.aarch64.rpm","sox-devel-14.4.2.0-31.oe2003sp4.aarch64.rpm"],"noarch":["sox-help-14.4.2.0-31.oe2003sp4.noarch.rpm"],"src":["sox-14.4.2.0-31.oe2003sp4.src.rpm"],"x86_64":["sox-14.4.2.0-31.oe2003sp4.x86_64.rpm","sox-debuginfo-14.4.2.0-31.oe2003sp4.x86_64.rpm","sox-debugsource-14.4.2.0-31.oe2003sp4.x86_64.rpm","sox-devel-14.4.2.0-31.oe2003sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"sox","purl":"pkg:rpm/openEuler/sox&distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14.4.2.0-31.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["sox-14.4.2.0-31.oe2203sp1.aarch64.rpm","sox-debuginfo-14.4.2.0-31.oe2203sp1.aarch64.rpm","sox-debugsource-14.4.2.0-31.oe2203sp1.aarch64.rpm","sox-devel-14.4.2.0-31.oe2203sp1.aarch64.rpm"],"noarch":["sox-help-14.4.2.0-31.oe2203sp1.noarch.rpm"],"src":["sox-14.4.2.0-31.oe2203sp1.src.rpm"],"x86_64":["sox-14.4.2.0-31.oe2203sp1.x86_64.rpm","sox-debuginfo-14.4.2.0-31.oe2203sp1.x86_64.rpm","sox-debugsource-14.4.2.0-31.oe2203sp1.x86_64.rpm","sox-devel-14.4.2.0-31.oe2203sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS","name":"sox","purl":"pkg:rpm/openEuler/sox&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"14.4.2.0-31.oe2403"}]}],"ecosystem_specific":{"aarch64":["sox-14.4.2.0-31.oe2403sp1.aarch64.rpm","sox-debuginfo-14.4.2.0-31.oe2403sp1.aarch64.rpm","sox-debugsource-14.4.2.0-31.oe2403sp1.aarch64.rpm","sox-devel-14.4.2.0-31.oe2403sp1.aarch64.rpm","sox-14.4.2.0-31.oe2403.aarch64.rpm","sox-debuginfo-14.4.2.0-31.oe2403.aarch64.rpm","sox-debugsource-14.4.2.0-31.oe2403.aarch64.rpm","sox-devel-14.4.2.0-31.oe2403.aarch64.rpm"],"noarch":["sox-help-14.4.2.0-31.oe2403sp1.noarch.rpm","sox-help-14.4.2.0-31.oe2403.noarch.rpm"],"src":["sox-14.4.2.0-31.oe2403sp1.src.rpm","sox-14.4.2.0-31.oe2403.src.rpm"],"x86_64":["sox-14.4.2.0-31.oe2403sp1.x86_64.rpm","sox-debuginfo-14.4.2.0-31.oe2403sp1.x86_64.rpm","sox-debugsource-14.4.2.0-31.oe2403sp1.x86_64.rpm","sox-devel-14.4.2.0-31.oe2403sp1.x86_64.rpm","sox-14.4.2.0-31.oe2403.x86_64.rpm","sox-debuginfo-14.4.2.0-31.oe2403.x86_64.rpm","sox-debugsource-14.4.2.0-31.oe2403.x86_64.rpm","sox-devel-14.4.2.0-31.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1020"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13590"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8354"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8355"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8356"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8357"}],"database_specific":{"severity":"Medium"}}