<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2025-0106</id>
    <title>An update for sox is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2025-02-27 13:08:34"/>
    <updated date="2025-02-27 13:08:34"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2019-8355" id="CVE-2019-8355" title="CVE-2019-8355 Base Score: 5.5 Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2019-8356" id="CVE-2019-8356" title="CVE-2019-8356 Base Score: 5.5 Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-40426" id="CVE-2021-40426" title="CVE-2021-40426 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2019-8354" id="CVE-2019-8354" title="CVE-2019-8354 Base Score: 5.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2019-8357" id="CVE-2019-8357" title="CVE-2019-8357 Base Score: 5.5 Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2019-13590" id="CVE-2019-13590" title="CVE-2019-13590 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c. (CVE-2019-8355)

An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow. (CVE-2019-8356)

A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. (CVE-2021-40426)

An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow. (CVE-2019-8354)

An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference. (CVE-2019-8357)

An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c. (CVE-2019-13590)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="sox">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="sox" version="14.4.2.0" release="29.r2.hce2">
          <filename>sox-14.4.2.0-29.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="sox-devel" version="14.4.2.0" release="29.r2.hce2">
          <filename>sox-devel-14.4.2.0-29.r2.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="sox" version="14.4.2.0" release="29.r2.hce2">
          <filename>sox-14.4.2.0-29.r2.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="sox-devel" version="14.4.2.0" release="29.r2.hce2">
          <filename>sox-devel-14.4.2.0-29.r2.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
