<<< Date Index >>>     <<< Thread Index >>>

[FLSA-2005:1945] Updated sox packages fix buffer overflows



---------------------------------------------------------------------
               Fedora Legacy Update Advisory

Synopsis:          Updated sox packages fix buffer overflows
Advisory ID:       FLSA:1945
Issue date:        2005-02-20
Product:           Red Hat Linux
Keywords:          Bugfix
Cross references:  https://bugzilla.fedora.us/show_bug.cgi?id=1945
CVE Names:         CAN-2004-0557
---------------------------------------------------------------------


---------------------------------------------------------------------
1. Topic:

Updated sox packages that fix buffer overflows in the WAV file handling
code are now available.

SoX (Sound eXchange) is a sound file format converter. SoX can convert
between many different digitized sound formats and perform simple sound
manipulation functions, including sound effects.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386

3. Problem description:

Buffer overflows existed in the parsing of WAV file header fields. It
was possible that a malicious WAV file could have caused arbitrary code
to be executed when the file was played or converted. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CAN-2004-0557 to these issues.

All users of sox should upgrade to these updated packages, which contain
a security patch to resolve these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

http://bugzilla.fedora.us - bug #1945 - sox buffer overflows

6. RPMs required:

Red Hat Linux 7.3:

SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/sox-12.17.3-4.1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/sox-12.17.3-4.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/sox-devel-12.17.3-4.1.legacy.i386.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/sox-12.17.3-11.1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/sox-12.17.3-11.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/sox-devel-12.17.3-11.1.legacy.i386.rpm

7. Verification:

SHA1 sum                                 Package Name
---------------------------------------------------------------------

5e0a7fa217885c997e7172017a61ee70ac2301b6 redhat/7.3/updates/i386/sox-12.17.3-4.1.legacy.i386.rpm 0f383f050988875f273e15d9c0aadd802d88001f redhat/7.3/updates/i386/sox-devel-12.17.3-4.1.legacy.i386.rpm b7735f908b893f2b3cd3d9681bc230af3a1344e7 redhat/7.3/updates/SRPMS/sox-12.17.3-4.1.legacy.src.rpm 42f91c34c3ce2ada6f0119961f92e747d962ab43 redhat/9/updates/i386/sox-12.17.3-11.1.legacy.i386.rpm bcc6f5c29e9df358703ff70233ba90a23e01e8cb redhat/9/updates/i386/sox-devel-12.17.3-11.1.legacy.i386.rpm 45f91336a69fb652fc1d4b0594a53784d3d1eb87 redhat/9/updates/SRPMS/sox-12.17.3-11.1.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is
available from http://www.fedoralegacy org/about/security.php

You can verify each package with the following command:

    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

    sha1sum <filename>

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0557

9. Contact:

The Fedora Legacy security contact is <secnotice@xxxxxxxxxxxxxxxx>. More
project details at http://www.fedoralegacy.org

---------------------------------------------------------------------

Attachment: signature.asc
Description: OpenPGP digital signature