Red Hat 9038 Published by

Updated sox packages are available for Red Hat Linux 7.3 and 9

---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated sox packages fix buffer overflows
Advisory ID: FLSA:1945
Issue date: 2005-02-20
Product: Red Hat Linux
Keywords: Bugfix
Cross references: https://bugzilla.fedora.us/show_bug.cgi?id=1945
CVE Names: CAN-2004-0557
---------------------------------------------------------------------


---------------------------------------------------------------------
1. Topic:

Updated sox packages that fix buffer overflows in the WAV file handling code are now available.

SoX (Sound eXchange) is a sound file format converter. SoX can convert between many different digitized sound formats and perform simple sound manipulation functions, including sound effects.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386



3. Problem description:

Buffer overflows existed in the parsing of WAV file header fields. It was possible that a malicious WAV file could have caused arbitrary code to be executed when the file was played or converted. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0557 to these issues.

All users of sox should upgrade to these updated packages, which contain a security patch to resolve these issues.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs.

Please note that this update is also available via yum and apt. Many people find this an easier way to apply updates. To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. This assumes that you have yum or apt-get configured for obtaining Fedora Legacy content. Please visit http://www fedoralegacy.org/docs for directions on how to configure yum and apt-get.

5. Bug IDs fixed:

http://bugzilla.fedora.us - bug #1945 - sox buffer overflows

6. RPMs required:

Red Hat Linux 7.3:

SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/sox-12.17.3-4.1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/sox-12.17.3-4.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/sox-devel-12.17.3-4.1.legacy.i386.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/sox-12.17.3-11.1.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/sox-12.17.3-11.1.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/sox-devel-12.17.3-11.1.legacy.i386.rpm

7. Verification:

SHA1 sum Package Name
---------------------------------------------------------------------

5e0a7fa217885c997e7172017a61ee70ac2301b6
redhat/7.3/updates/i386/sox-12.17.3-4.1.legacy.i386.rpm
0f383f050988875f273e15d9c0aadd802d88001f
redhat/7.3/updates/i386/sox-devel-12.17.3-4.1.legacy.i386.rpm
b7735f908b893f2b3cd3d9681bc230af3a1344e7
redhat/7.3/updates/SRPMS/sox-12.17.3-4.1.legacy.src.rpm
42f91c34c3ce2ada6f0119961f92e747d962ab43
redhat/9/updates/i386/sox-12.17.3-11.1.legacy.i386.rpm
bcc6f5c29e9df358703ff70233ba90a23e01e8cb
redhat/9/updates/i386/sox-devel-12.17.3-11.1.legacy.i386.rpm
45f91336a69fb652fc1d4b0594a53784d3d1eb87
redhat/9/updates/SRPMS/sox-12.17.3-11.1.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security. Our key is available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v filename

If you only wish to verify that each package has not been corrupted or tampered with, examine only the sha1sum with the following command:

sha1sum filename

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0557

9. Contact:

The Fedora Legacy security contact is secnotice@fedoralegacy.org. More
project details at http://www.fedoralegacy.org