![]() (CVE-2021-23172) - A floating point exception (divide-by-zero) issue was discovered in SoX in functon read_samples() of voc.c file. The vulnerability is exploitable with a crafted hcomn file, that could cause an application to crash. (CVE-2021-23159) - A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function startread() in hcom.c file. The vulnerability is exploitable with a crafted file, that could cause an application to crash. (CVE-2021-3643) - A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function lsx_read_w_buf() in formats_i.c file. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information. ![]() The lsx_adpcm_init function within libsox leads to a global-buffer- overflow. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. An issue was discovered in libsox.a in SoX 14.4.2. ![]() Description The remote Ubuntu 16.04 ESM / 18.04 LTS / 20.04 LTS / 22.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-5904-1 advisory. Synopsis The remote Ubuntu host is missing one or more security updates.
0 Comments
Leave a Reply. |