Package: sox / 14.4.2+git20190427-3.5
Metadata
Package | Version | Patches format |
---|---|---|
sox | 14.4.2+git20190427-3.5 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 fix build.patch | (download) |
src/Makefile.am |
2 1 + 1 - 0 ! |
fix build |
0003 spelling.patch | (download) |
ChangeLog |
2 1 + 1 - 0 ! |
spelling fixes |
0005 CVE 2017 15371.patch | (download) |
src/flac.c |
8 5 + 3 - 0 ! |
[patch] flac: fix crash on corrupt metadata (cve-2017-15371) |
CVE 2017 11358.patch | (download) |
src/hcom.c |
13 13 + 0 - 0 ! |
[patch] hcom: fix crash on input with corrupt dictionary (CVE-2017-11358) |
0007 CVE 2017 15370.patch | (download) |
src/wav.c |
2 1 + 1 - 0 ! |
[patch] wav: ima_adpcm: fix buffer overflow on corrupt input (CVE-2017-15370) Add the same check bad block size as was done for MS adpcm in commit f39c574b ("More checks for invalid MS ADPCM blocks"). |
0008 CVE 2017 11332.patch | (download) |
src/wav.c |
5 5 + 0 - 0 ! |
[patch] wav: fix crash if channel count is zero (cve-2017-11332) |
0009 CVE 2017 11359.patch | (download) |
src/wav.c |
6 6 + 0 - 0 ! |
[patch] wav: fix crash writing header when channel count >64k (CVE-2017-11359) |
0010 wavpack_check_errors.patch | (download) |
src/wavpack.c |
8 8 + 0 - 0 ! |
wavpack: check errors when initializing https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881145 |
0011 lintian man sox.patch | (download) |
sox.1 |
2 1 + 1 - 0 ! |
fix - w: sox: manpage-has-errors-from-man usr/share/man/man1/sox.1.gz file `<standard input>' |
0012 xa validate channel count.patch | (download) |
src/xa.c |
6 6 + 0 - 0 ! |
a corrupt header specifying zero channels would send read_channels() into an infinite loop. Prevent this by sanity checking the channel count in open_read(). Also add an upper bound to prevent overflow in multiplication. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881121 |
0013 CVE 2017 15372.patch | (download) |
src/adpcm.c |
8 7 + 1 - 0 ! |
adpcm: fix stack overflow with >4 channels (cve-2017-15372) |
0014 CVE 2017 15642.patch | (download) |
src/aiff.c |
2 1 + 1 - 0 ! |
this fixes a use after free and double free if an empty comment chunk follows a non-empty one. |
0015 Handle vorbis_analysis_headerout errors.patch | (download) |
src/vorbis.c |
8 6 + 2 - 0 ! |
[patch] handle vorbis_analysis_headerout errors This is related to https://github.com/xiph/vorbis/pull/34 but could also happen today with on other errors in the called function. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882236 |
0016 CVE 2019 8354.patch | (download) |
src/effects_i_dsp.c |
2 1 + 1 - 0 ! |
--- |
0017 CVE 2019 8355.patch | (download) |
src/Makefile.am |
2 1 + 1 - 0 ! |
--- |
0018 CVE 2019 8356.patch | (download) |
src/fft4g.c |
18 18 + 0 - 0 ! |
--- |
0019 CVE 2019 8357.patch | (download) |
src/effects_i_dsp.c |
3 3 + 0 - 0 ! |
--- |
0020 CVE 2019 13590.patch | (download) |
src/sox-fmt.c |
4 3 + 1 - 0 ! |
--- |
fix resource leak comments.patch | (download) |
src/formats.c |
1 1 + 0 - 0 ! |
fix a resource leak of comments on input parsing failure |
fix resource leak hcom.patch | (download) |
src/hcom.c |
11 8 + 3 - 0 ! |
hcom: fix dictionary resource leaks startread and stopread should release p->dictionary in all failure modes. |
fix hcom big endian.patch | (download) |
src/hcom.c |
9 5 + 4 - 0 ! |
[patch] hcom: fix pointer type confusion [bug #308] The compress() call fails on big endian systems with size_t bigger than int32_t. Fix by using the correct types. |
CVE 2021 3643.patch | (download) |
src/voc.c |
4 4 + 0 - 0 ! |
voc: word width should never be 0 to avoid division by zero Bug: https://sourceforge.net/p/sox/bugs/351/ Bug-Debian: https://bugs.debian.org/1010374 This patch fixes both CVE-2021-3643 and CVE-2021-23210. |
CVE 2021 23159.patch | (download) |
src/hcom.c |
5 5 + 0 - 0 ! |
hcom: validate dictsize Bug: https://sourceforge.net/p/sox/bugs/350/ Bug: https://sourceforge.net/p/sox/bugs/352/ Bug-Debian: https://bugs.debian.org/1021133 Bug-Debian: https://bugs.debian.org/1021134 This patch fixes both CVE-2021-23159 and CVE-2021-23172. |
CVE 2021 33844.patch | (download) |
src/testall.sh |
1 1 + 0 - 0 ! |
wav: reject 0 bits per sample to avoid division by zero Bug: https://sourceforge.net/p/sox/bugs/349/ Bug-Debian: https://bugs.debian.org/1021135 |
CVE 2021 40426.patch | (download) |
src/sphere.c |
6 4 + 2 - 0 ! |
sphere: avoid integer underflow Link: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434 Bug: https://sourceforge.net/p/sox/bugs/362/ Bug-Debian: https://bugs.debian.org/1012138 |
CVE 2022 31650.patch | (download) |
src/aiff.c |
5 5 + 0 - 0 ! |
formats+aiff: reject implausibly large number of channels Bug: https://sourceforge.net/p/sox/bugs/360/ Bug-Debian: https://bugs.debian.org/1012516 |
CVE 2022 31651.patch | (download) |
src/formats_i.c |
10 8 + 2 - 0 ! |
formats: reject implausible rate Bug: https://sourceforge.net/p/sox/bugs/360/ Bug-Debian: https://bugs.debian.org/1012516 |