发布时间: 2025年1月10日
修改时间: 2025年1月10日
An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Local | Local |
CVSS评分 | 5.5 | 5.5 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | Required | Required |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-1129 | sox security update | 2025年3月8日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | sox | Fixed |
KY3.5.2 | sox | Fixed |
KY3.5.3 | sox | Fixed |
V6 | sox | Fixed |