An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
References
Link | Resource |
---|---|
https://sourceforge.net/p/sox/bugs/325/ | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html |
Configurations
Information
Published : 2019-07-14 09:15
Updated : 2023-02-10 00:15
NVD link : CVE-2019-13590
Mitre link : CVE-2019-13590
JSON object : View
Products Affected
sound_exchange_project
- sound_exchange