First published: Tue Dec 12 2023(Updated: )
Espeak-ng 1.52-dev was discovered to contain a buffer-overflow via the function SetUpPhonemeTable at synthdata.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Espeak-ng Espeak-ng | =1.52-dev | |
ubuntu/espeak-ng | <1.49.2+dfsg-1ubuntu0.1~ | 1.49.2+dfsg-1ubuntu0.1~ |
ubuntu/espeak-ng | <1.50+dfsg-6ubuntu0.1 | 1.50+dfsg-6ubuntu0.1 |
ubuntu/espeak-ng | <1.50+dfsg-10ubuntu0.1 | 1.50+dfsg-10ubuntu0.1 |
ubuntu/espeak-ng | <1.51+dfsg-11ubuntu0.1 | 1.51+dfsg-11ubuntu0.1 |
ubuntu/espeak-ng | <1.51+dfsg-12 | 1.51+dfsg-12 |
debian/espeak-ng | <=1.50+dfsg-7+deb11u1 | 1.51+dfsg-10+deb12u1 1.51+dfsg-12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49990 has a high severity due to its buffer overflow vulnerability that can potentially lead to remote code execution.
To fix CVE-2023-49990, update to Espeak-ng versions 1.49.2+dfsg-1ubuntu0.1~, 1.50+dfsg-6ubuntu0.1, 1.51+dfsg-11ubuntu0.1, or any later versions.
Espeak-ng version 1.52-dev is affected by CVE-2023-49990.
CVE-2023-49990 is caused by a buffer overflow in the SetUpPhonemeTable function in synthdata.c.
As of now, there are no publicly disclosed exploits specifically targeting CVE-2023-49990.