--------------------------------------------------------------------- Fedora Legacy Update Advisory Synopsis: Updated sox packages fix buffer overflows Advisory ID: FLSA:1945 Issue date: 2005-02-20 Product: Red Hat Linux Keywords: Bugfix Cross references: https://bugzilla.fedora.us/show_bug.cgi?id=1945 CVE Names: CAN-2004-0557 --------------------------------------------------------------------- --------------------------------------------------------------------- 1. Topic: Updated sox packages that fix buffer overflows in the WAV file handling code are now available. SoX (Sound eXchange) is a sound file format converter. SoX can convert between many different digitized sound formats and perform simple sound manipulation functions, including sound effects. 2. Relevant releases/architectures: Red Hat Linux 7.3 - i386 Red Hat Linux 9 - i386 3. Problem description: Buffer overflows existed in the parsing of WAV file header fields. It was possible that a malicious WAV file could have caused arbitrary code to be executed when the file was played or converted. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0557 to these issues. All users of sox should upgrade to these updated packages, which contain a security patch to resolve these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue: yum update or to use apt: apt-get update; apt-get upgrade This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www fedoralegacy.org/docs for directions on how to configure yum and apt-get. 5. Bug IDs fixed: http://bugzilla.fedora.us - bug #1945 - sox buffer overflows 6. RPMs required: Red Hat Linux 7.3: SRPM: http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/sox-12.17.3-4.1.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/7.3/updates/i386/sox-12.17.3-4.1.legacy.i386.rpm http://download.fedoralegacy.org/redhat/7.3/updates/i386/sox-devel-12.17.3-4.1.legacy.i386.rpm Red Hat Linux 9: SRPM: http://download.fedoralegacy.org/redhat/9/updates/SRPMS/sox-12.17.3-11.1.legacy.src.rpm i386: http://download.fedoralegacy.org/redhat/9/updates/i386/sox-12.17.3-11.1.legacy.i386.rpm http://download.fedoralegacy.org/redhat/9/updates/i386/sox-devel-12.17.3-11.1.legacy.i386.rpm 7. Verification: SHA1 sum Package Name ---------------------------------------------------------------------5e0a7fa217885c997e7172017a61ee70ac2301b6 redhat/7.3/updates/i386/sox-12.17.3-4.1.legacy.i386.rpm 0f383f050988875f273e15d9c0aadd802d88001f redhat/7.3/updates/i386/sox-devel-12.17.3-4.1.legacy.i386.rpm b7735f908b893f2b3cd3d9681bc230af3a1344e7 redhat/7.3/updates/SRPMS/sox-12.17.3-4.1.legacy.src.rpm 42f91c34c3ce2ada6f0119961f92e747d962ab43 redhat/9/updates/i386/sox-12.17.3-11.1.legacy.i386.rpm bcc6f5c29e9df358703ff70233ba90a23e01e8cb redhat/9/updates/i386/sox-devel-12.17.3-11.1.legacy.i386.rpm 45f91336a69fb652fc1d4b0594a53784d3d1eb87 redhat/9/updates/SRPMS/sox-12.17.3-11.1.legacy.src.rpm
These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy org/about/security.php You can verify each package with the following command: rpm --checksig -v <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command: sha1sum <filename> 8. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0557 9. Contact: The Fedora Legacy security contact is <secnotice@xxxxxxxxxxxxxxxx>. More project details at http://www.fedoralegacy.org ---------------------------------------------------------------------
Attachment:
signature.asc
Description: OpenPGP digital signature