diff options
author | Zach van Rijn <me@zv.io> | 2023-02-06 03:51:29 +0000 |
---|---|---|
committer | Zach van Rijn <me@zv.io> | 2023-02-06 03:53:58 +0000 |
commit | 491802e5efd6fa2d5543de51e93ffc2ae0a6f1b1 (patch) | |
tree | 1b72677c935f5c82312062ad291474fba200c2be /legacy/sox/CVE-2019-8357.patch | |
parent | 130b4b415b5591a7320ea3cfdf87c43987916655 (diff) | |
download | packages-491802e5efd6fa2d5543de51e93ffc2ae0a6f1b1.tar.gz packages-491802e5efd6fa2d5543de51e93ffc2ae0a6f1b1.tar.bz2 packages-491802e5efd6fa2d5543de51e93ffc2ae0a6f1b1.tar.xz packages-491802e5efd6fa2d5543de51e93ffc2ae0a6f1b1.zip |
user/sox: move to legacy/
This package has numerous CVEs and does not currently
build on our pmmx target. It is not required by any
other packages at the moment.
See also: #961.
Diffstat (limited to 'legacy/sox/CVE-2019-8357.patch')
-rw-r--r-- | legacy/sox/CVE-2019-8357.patch | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/legacy/sox/CVE-2019-8357.patch b/legacy/sox/CVE-2019-8357.patch new file mode 100644 index 000000000..ec2b04d30 --- /dev/null +++ b/legacy/sox/CVE-2019-8357.patch @@ -0,0 +1,28 @@ +From 2ce02fea7b350de9ddfbcf542ba4dd59a8ab255b Mon Sep 17 00:00:00 2001 +From: Mans Rullgard <mans@mansr.com> +Date: Wed, 24 Apr 2019 15:08:51 +0100 +Subject: [PATCH] fix possible null pointer deref in lsx_make_lpf() + (CVE-2019-8357) + +If the buffer allocation fails, return NULL. +--- + src/effects_i_dsp.c | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/src/effects_i_dsp.c b/src/effects_i_dsp.c +index e32dfa05..88b1b390 100644 +--- a/src/effects_i_dsp.c ++++ b/src/effects_i_dsp.c +@@ -362,6 +362,9 @@ double * lsx_make_lpf(int num_taps, double Fc, double beta, double rho, + assert(Fc >= 0 && Fc <= 1); + lsx_debug("make_lpf(n=%i Fc=%.7g β=%g ρ=%g dc-norm=%i scale=%g)", num_taps, Fc, beta, rho, dc_norm, scale); + ++ if (!h) ++ return NULL; ++ + for (i = 0; i <= m / 2; ++i) { + double z = i - .5 * m, x = z * M_PI, y = z * mult1; + h[i] = x? sin(Fc * x) / x : Fc; +-- +2.25.0 + |