Package: sox / 14.4.1-5+deb9u2
Metadata
Package | Version | Patches format |
---|---|---|
sox | 14.4.1-5+deb9u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 Check for minimum size sphere headers.patch | (download) |
src/sphere.c |
5 5 + 0 - 0 ! |
--- |
0002 More checks for invalid MS ADPCM blocks.patch | (download) |
src/wav.c |
2 1 + 1 - 0 ! |
--- |
CVE 2017 15370.patch | (download) |
src/wav.c |
2 1 + 1 - 0 ! |
wav: ima_adpcm: fix buffer overflow on corrupt input Add the same check bad block size as was done for MS adpcm in patch 0002-More-checks-for-invalid-MS-ADPCM-blocks.patch. |
CVE 2017 15372.patch | (download) |
src/adpcm.c |
8 7 + 1 - 0 ! |
fix stack buffer overflow in lsx_ms_adpcm_block_expand_i |
CVE 2017 18189.patch | (download) |
src/xa.c |
6 6 + 0 - 0 ! |
xa: validate channel count A corrupt header specifying zero channels would send read_channels() into an infinite loop. Prevent this by sanity checking the channel count in open_read(). Also add an upper bound to prevent overflow in multiplication. |
CVE 2017 15642.patch | (download) |
src/aiff.c |
2 1 + 1 - 0 ! |
aiff: fix crash on empty comment chunk (cve-2017-15642) This fixes a use after free and double free if an empty comment chunk follows a non-empty one. |
CVE 2017 11332.patch | (download) |
src/wav.c |
5 5 + 0 - 0 ! |
wav: fix crash if channel count is zero WAV files declaring zero channels lead to division-by-zero crashes. numchannels = 0 is not a meaningful value, forbid it. |
CVE 2017 11358.patch | (download) |
src/hcom.c |
5 5 + 0 - 0 ! |
hcom: fix crash on input with corrupt dictionary |
CVE 2017 11359.patch | (download) |
src/wav.c |
6 6 + 0 - 0 ! |
wav: fix crash writing header when channel count >64k High number of channels (>64k) lead to divide-by-zero error and crash. Number of channels should be representable with 16 bits, so forbid any higher value. |
CVE 2017 15371.patch | (download) |
src/flac.c |
8 5 + 3 - 0 ! |
flac: fix crash on corrupt metadata |
0001 Clean up lsx_malloc and friends.patch | (download) |
src/xmalloc.c |
30 25 + 5 - 0 ! |
[patch 1/5] clean up lsx_malloc() and friends |
0002 fix possible buffer size overflow in lsx_make_lpf CV.patch | (download) |
src/effects_i_dsp.c |
2 1 + 1 - 0 ! |
[patch 2/5] fix possible buffer size overflow in lsx_make_lpf() (CVE-2019-8354) The multiplication in the size argument malloc() might overflow, resulting in a small buffer being allocated. Use calloc() instead. |
0003 fix possible overflow in lsx_ re valloc size calcula.patch | (download) |
src/xmalloc.c |
10 10 + 0 - 0 ! |
[patch 3/5] fix possible overflow in lsx_(re)valloc() size calculation (CVE-2019-8355) |
0004 fft4g bail if size too large CVE 2019 8356.patch | (download) |
src/fft4g.c |
18 18 + 0 - 0 ! |
[patch 4/5] fft4g: bail if size too large (cve-2019-8356) Prevent overflowing of fixed-size buffers in bitrv2() and bitrv2conj() if the transform size is too large. |
0005 fix possible null pointer deref in lsx_make_lpf CVE .patch | (download) |
src/effects_i_dsp.c |
4 4 + 0 - 0 ! |
[patch 5/5] fix possible null pointer deref in lsx_make_lpf() (CVE-2019-8357) If the buffer allocation fails, return NULL. |