Bug 1737764 (CVE-2019-13590) - CVE-2019-13590 sox: integer overflow in libsox.a leading to a NULL pointer dereference
Summary: CVE-2019-13590 sox: integer overflow in libsox.a leading to a NULL pointer de...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-13590
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1737765 1791805
Blocks: 1737766
TreeView+ depends on / blocked
 
Reported: 2019-08-06 07:55 UTC by Marian Rehak
Modified: 2021-10-25 22:11 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-25 22:11:11 UTC
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2019-08-06 07:55:45 UTC
An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.

Upstream Issue:

https://sourceforge.net/p/sox/bugs/325/

Comment 1 Marian Rehak 2019-08-06 07:56:24 UTC
Created sox tracking bugs for this issue:

Affects: fedora-all [bug 1737765]

Comment 3 Stefan Cornelius 2020-01-16 12:14:12 UTC
Statement:

This is only an issue when using the 32bit version of the library.


Note You need to log in before you can comment on or make changes to this bug.