First published: Fri May 05 2023(Updated: )
A heap buffer overflow vulnerability was found in sox, in the startread function at sox/src/hcom.c:160:41. This flaw can lead to a denial of service, code execution, or information disclosure.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sox Project Sox | =14.4.3 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =38 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34318 is high.
You can find more information about CVE-2023-34318 on the Red Hat Security Portal.
CVE-2023-34318 affects sox version 14.4.3.
An attacker exploiting CVE-2023-34318 can perform a denial of service, execute arbitrary code, or disclose information.
To fix CVE-2023-34318, it is recommended to update to a patched version of sox.