• 公告ID (KylinSec-SA-2025-1129)

摘要:

sox security update

安全等级: Medium

公告ID: KylinSec-SA-2025-1129

发布日期: 2025年3月8日

关联CVE: CVE-2019-13590   CVE-2019-8354   CVE-2019-8355   CVE-2019-8356   CVE-2019-8357  

  • 详细介绍

1. 漏洞描述

   

SoX is a cross-platform (Windows, Linux, MacOS X, etc.) command line utility that can convert various formats of computer audio files in to other formats. It can also apply various effects to these sound files, and, as an added bonus, SoX can play and record audio files on most platforms.

Security Fix(es):

An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.(CVE-2019-13590)

An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.(CVE-2019-8354)

An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.(CVE-2019-8355)

An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.(CVE-2019-8356)

An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.(CVE-2019-8357)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2019-13590 KY3.4-5A sox Fixed
CVE-2019-13590 KY3.5.2 sox Fixed
CVE-2019-13590 V6 sox Fixed
CVE-2019-8354 KY3.4-5A sox Fixed
CVE-2019-8354 KY3.5.2 sox Fixed
CVE-2019-8354 V6 sox Fixed
CVE-2019-8355 KY3.4-5A sox Fixed
CVE-2019-8355 KY3.5.2 sox Fixed
CVE-2019-8355 V6 sox Fixed
CVE-2019-8356 KY3.4-5A sox Fixed
CVE-2019-8356 KY3.5.2 sox Fixed
CVE-2019-8356 V6 sox Fixed
CVE-2019-8357 KY3.4-5A sox Fixed
CVE-2019-8357 KY3.5.2 sox Fixed
CVE-2019-8357 V6 sox Fixed

3. 影响组件

    sox

4. 修复版本

   

KY3.4-5A

软件名称 架构 版本号
sox-help noarch 14.4.2.0-31.kb1.ky3_4
sox x86_64 14.4.2.0-31.kb1.ky3_4
sox-devel x86_64 14.4.2.0-31.kb1.ky3_4
sox aarch64 14.4.2.0-31.kb1.ky3_4
sox-devel aarch64 14.4.2.0-31.kb1.ky3_4

V6

软件名称 架构 版本号
sox-help noarch 14.4.2.0-31.ks6
sox x86_64 14.4.2.0-31.ks6
sox-devel x86_64 14.4.2.0-31.ks6
sox aarch64 14.4.2.0-31.ks6
sox-devel aarch64 14.4.2.0-31.ks6

KY3.5.2

软件名称 架构 版本号
sox-help noarch 14.4.2.0-31.ky3_5
sox x86_64 14.4.2.0-31.ky3_5
sox-devel x86_64 14.4.2.0-31.ky3_5
sox aarch64 14.4.2.0-31.ky3_5
sox-devel aarch64 14.4.2.0-31.ky3_5

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.4-5A:

x86_64:

     sox-help   

     sox   

     sox-devel   

aarch64:

     sox-help   

     sox   

     sox-devel   

V6:

x86_64:

     sox-help   

     sox   

     sox-devel   

aarch64:

     sox-help   

     sox   

     sox-devel   

KY3.5.2:

x86_64:

     sox-help   

     sox   

     sox-devel   

aarch64:

     sox-help   

     sox   

     sox-devel   

上一篇:KylinSec-SA-2025-1266 下一篇:KylinSec-SA-2025-1130