Bug 1125801 - (CVE-2019-8355) VUL-1: CVE-2019-8355: sox: integer overflow in xmalloc.h
VUL-1: CVE-2019-8355: sox: integer overflow in xmalloc.h
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.1
Other Other
: P4 - Low : Normal (vote)
: ---
Assigned To: Pavol Rusnak
Security Team bot
Depends on:
  Show dependency treegraph
Reported: 2019-02-18 15:27 UTC by Robert Frohl
Modified: 2020-01-16 14:03 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2019-02-18 15:27:02 UTC

An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer
overflow on the result of multiplication fed into the lsx_valloc macro that
wraps malloc. When the buffer is allocated, it is smaller than expected, leading
to a heap-based buffer overflow in channels_start in remix.c.

Comment 1 Tomáš Chvátal 2019-07-11 11:39:27 UTC
This is automated batch bugzilla cleanup.

The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such
it is no longer maintained, which means that it will not receive any
further security or bug fix updates.
As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of 
openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please
feel free to reopen this bug against that version (!you must update the
"Version" component in the bug fields, do not just reopen please), or
alternatively create a new ticket.

Thank you for reporting this bug and we are sorry it could not be fixed
during the lifetime of the release.

[1] https://en.opensuse.org/Lifetime
Comment 2 Marcus Meissner 2019-07-12 06:04:02 UTC
unfixed in 15.0 and newer.

no maintainer