CVE-2019-8356

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-8356
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-8356.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-8356
Related
Published
2019-02-15T23:29:00Z
Modified
2024-11-21T04:49:44Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.

References

Affected packages

Debian:11 / sox

Package

Name
sox
Purl
pkg:deb/debian/sox?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
14.4.2+git20190427-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sox

Package

Name
sox
Purl
pkg:deb/debian/sox?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
14.4.2+git20190427-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / sox

Package

Name
sox
Purl
pkg:deb/debian/sox?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
14.4.2+git20190427-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}