Bug 1141671 - (CVE-2019-13590) VUL-1: CVE-2019-13590: sox: An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow
(CVE-2019-13590)
VUL-1: CVE-2019-13590: sox: An issue was discovered in libsox.a in SoX 14.4.2...
Status: NEW
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.1
Other Other
: P4 - Low : Minor (vote)
: ---
Assigned To: Pavol Rusnak
Security Team bot
https://smash.suse.de/issue/237117/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-07-16 14:37 UTC by Wolfgang Frisch
Modified: 2020-01-16 14:53 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
PoC (36 bytes, application/octet-stream)
2019-07-16 14:37 UTC, Wolfgang Frisch
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2019-07-16 14:37:27 UTC
Created attachment 810602 [details]
PoC

CVE-2019-13590

An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread
function), there is an integer overflow on the result of integer addition
(wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL
pointer is returned, it is used without a prior check that it is a valid
pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13590
http://www.cvedetails.com/cve/CVE-2019-13590/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13590
https://sourceforge.net/p/sox/bugs/325/