First published: Mon Jun 05 2023(Updated: )
A heap buffer overflow vulnerability was found in sox, in the lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can lead to a denial of service, code execution, or information disclosure.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sound Exchange Project Sound Exchange | <=14.4.3 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =38 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34432 is a heap buffer overflow vulnerability found in sox.
CVE-2023-34432 can lead to a denial of service, code execution, or information disclosure.
The affected software includes Sound Exchange Project Sound Exchange, Redhat Enterprise Linux versions 6.0 and 7.0, Fedoraproject Extra Packages For Enterprise Linux version 8.0, and Fedoraproject Fedora version 38.
CVE-2023-34432 has a severity level of 7 (high).
To fix CVE-2023-34432, it is recommended to update the affected software to a version that has addressed the vulnerability.