First published: Mon Jun 05 2023(Updated: )
A floating point exception vulnerability was found in sox, in the read_samples function at sox/src/voc.c:334:18. This flaw can lead to a denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/sox | <14.4.2+ | 14.4.2+ |
ubuntu/sox | <14.4.2-3ubuntu0.18.04.3+ | 14.4.2-3ubuntu0.18.04.3+ |
ubuntu/sox | <14.4.2+ | 14.4.2+ |
ubuntu/sox | <14.4.2+ | 14.4.2+ |
ubuntu/sox | <14.4.2+ | 14.4.2+ |
ubuntu/sox | <14.4.1-3ubuntu1.1+ | 14.4.1-3ubuntu1.1+ |
ubuntu/sox | <14.4.1-5+ | 14.4.1-5+ |
Sox Project Sox | =14.4.3 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =38 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
=14.4.3 | ||
=8.0 | ||
=38 | ||
=6.0 | ||
=7.0 | ||
debian/sox | <=14.4.2+git20190427-1<=14.4.2+git20190427-2+deb11u2<=14.4.2+git20190427-3.5 | 14.4.2+git20190427-1+deb10u3 14.4.2+git20190427-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32627 is a floating point exception vulnerability found in the read_samples function of sox.
CVE-2023-32627 has a severity rating of medium with a score of 5.5.
The affected software versions include sox 14.4.3, Fedoraproject Extra Packages For Enterprise Linux 8.0, Fedoraproject Fedora 38, Redhat Enterprise Linux 6.0 and 7.0.
To fix CVE-2023-32627, you should update to a version that contains the fix, such as sox 14.4.2+git20190427-1+deb10u3 for Debian, or follow the recommendations provided by your software vendor.
You can find more information about CVE-2023-32627 at the following references: [Red Hat Security Advisory](https://access.redhat.com/security/cve/CVE-2023-32627), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2212282), and [SoX Project SourceForge](https://sourceforge.net/p/sox/bugs/369/)