Package: sox / 14.4.2+git20190427-3.5
Metadata
| Package | Version | Patches format | 
|---|---|---|
| sox | 14.4.2+git20190427-3.5 | 3.0 (quilt) | 
Patch series
view the series file| Patch | File delta | Description | 
|---|---|---|
| 0001 fix build.patch | (download) | 
              src/Makefile.am |
                    2 	1 +	1 -	0 !  | 
          fix build  | 
        
| 0003 spelling.patch | (download) | 
              ChangeLog |
                    2 	1 +	1 -	0 !  | 
          spelling fixes  | 
        
| 0005 CVE 2017 15371.patch | (download) | 
              src/flac.c |
                    8 	5 +	3 -	0 !  | 
          [patch] flac: fix crash on corrupt metadata (cve-2017-15371)  | 
        
| CVE 2017 11358.patch | (download) | 
              src/hcom.c |
                   13 	13 +	0 -	0 !  | 
          [patch] hcom: fix crash on input with corrupt dictionary (CVE-2017-11358)  | 
        
| 0007 CVE 2017 15370.patch | (download) | 
              src/wav.c |
                    2 	1 +	1 -	0 !  | 
           [patch] wav: ima_adpcm: fix buffer overflow on corrupt input
 (CVE-2017-15370)
Add the same check bad block size as was done for MS adpcm in commit
f39c574b ("More checks for invalid MS ADPCM blocks").
           | 
        
| 0008 CVE 2017 11332.patch | (download) | 
              src/wav.c |
                    5 	5 +	0 -	0 !  | 
          [patch] wav: fix crash if channel count is zero (cve-2017-11332)  | 
        
| 0009 CVE 2017 11359.patch | (download) | 
              src/wav.c |
                    6 	6 +	0 -	0 !  | 
          [patch] wav: fix crash writing header when channel count >64k (CVE-2017-11359)  | 
        
| 0010 wavpack_check_errors.patch | (download) | 
              src/wavpack.c |
                    8 	8 +	0 -	0 !  | 
          wavpack: check errors when initializing https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881145  | 
        
| 0011 lintian man sox.patch | (download) | 
              sox.1 |
                    2 	1 +	1 -	0 !  | 
          fix - w: sox: manpage-has-errors-from-man usr/share/man/man1/sox.1.gz file `<standard input>'  | 
        
| 0012 xa validate channel count.patch | (download) | 
              src/xa.c |
                    6 	6 +	0 -	0 !  | 
          a corrupt header specifying zero channels would send read_channels() into an infinite loop. Prevent this by sanity checking the channel count in open_read(). Also add an upper bound to prevent overflow in multiplication. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881121  | 
        
| 0013 CVE 2017 15372.patch | (download) | 
              src/adpcm.c |
                    8 	7 +	1 -	0 !  | 
          adpcm: fix stack overflow with >4 channels (cve-2017-15372)  | 
        
| 0014 CVE 2017 15642.patch | (download) | 
              src/aiff.c |
                    2 	1 +	1 -	0 !  | 
          this fixes a use after free and double free if an empty comment chunk follows a non-empty one.  | 
        
| 0015 Handle vorbis_analysis_headerout errors.patch | (download) | 
              src/vorbis.c |
                    8 	6 +	2 -	0 !  | 
           [patch] handle vorbis_analysis_headerout errors
This is related to
    https://github.com/xiph/vorbis/pull/34
but could also happen today with on other errors in the called function.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882236
           | 
        
| 0016 CVE 2019 8354.patch | (download) | 
              src/effects_i_dsp.c |
                    2 	1 +	1 -	0 !  | 
          ---  | 
        
| 0017 CVE 2019 8355.patch | (download) | 
              src/Makefile.am |
                    2 	1 +	1 -	0 !  | 
          ---  | 
        
| 0018 CVE 2019 8356.patch | (download) | 
              src/fft4g.c |
                   18 	18 +	0 -	0 !  | 
          ---  | 
        
| 0019 CVE 2019 8357.patch | (download) | 
              src/effects_i_dsp.c |
                    3 	3 +	0 -	0 !  | 
          ---  | 
        
| 0020 CVE 2019 13590.patch | (download) | 
              src/sox-fmt.c |
                    4 	3 +	1 -	0 !  | 
          ---  | 
        
| fix resource leak comments.patch | (download) | 
              src/formats.c |
                    1 	1 +	0 -	0 !  | 
          fix a resource leak of comments on input parsing failure  | 
        
| fix resource leak hcom.patch | (download) | 
              src/hcom.c |
                   11 	8 +	3 -	0 !  | 
          hcom: fix dictionary resource leaks startread and stopread should release p->dictionary in all failure modes.  | 
        
| fix hcom big endian.patch | (download) | 
              src/hcom.c |
                    9 	5 +	4 -	0 !  | 
          [patch] hcom: fix pointer type confusion [bug #308] The compress() call fails on big endian systems with size_t bigger than int32_t. Fix by using the correct types.  | 
        
| CVE 2021 3643.patch | (download) | 
              src/voc.c |
                    4 	4 +	0 -	0 !  | 
          voc: word width should never be 0 to avoid division by zero Bug: https://sourceforge.net/p/sox/bugs/351/ Bug-Debian: https://bugs.debian.org/1010374 This patch fixes both CVE-2021-3643 and CVE-2021-23210.  | 
        
| CVE 2021 23159.patch | (download) | 
              src/hcom.c |
                    5 	5 +	0 -	0 !  | 
          hcom: validate dictsize Bug: https://sourceforge.net/p/sox/bugs/350/ Bug: https://sourceforge.net/p/sox/bugs/352/ Bug-Debian: https://bugs.debian.org/1021133 Bug-Debian: https://bugs.debian.org/1021134 This patch fixes both CVE-2021-23159 and CVE-2021-23172.  | 
        
| CVE 2021 33844.patch | (download) | 
              src/testall.sh |
                    1 	1 +	0 -	0 !  | 
          wav: reject 0 bits per sample to avoid division by zero Bug: https://sourceforge.net/p/sox/bugs/349/ Bug-Debian: https://bugs.debian.org/1021135  | 
        
| CVE 2021 40426.patch | (download) | 
              src/sphere.c |
                    6 	4 +	2 -	0 !  | 
          sphere: avoid integer underflow Link: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434 Bug: https://sourceforge.net/p/sox/bugs/362/ Bug-Debian: https://bugs.debian.org/1012138  | 
        
| CVE 2022 31650.patch | (download) | 
              src/aiff.c |
                    5 	5 +	0 -	0 !  | 
          formats+aiff: reject implausibly large number of channels Bug: https://sourceforge.net/p/sox/bugs/360/ Bug-Debian: https://bugs.debian.org/1012516  | 
        
| CVE 2022 31651.patch | (download) | 
              src/formats_i.c |
                   10 	8 +	2 -	0 !  | 
          formats: reject implausible rate Bug: https://sourceforge.net/p/sox/bugs/360/ Bug-Debian: https://bugs.debian.org/1012516  | 
        
