First published: Tue Dec 12 2023(Updated: )
Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Overflow via the function RemoveEnding at dictionary.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Espeak-ng Espeak-ng | =1.52-dev | |
ubuntu/espeak-ng | <1.49.2+dfsg-1ubuntu0.1~ | 1.49.2+dfsg-1ubuntu0.1~ |
ubuntu/espeak-ng | <1.50+dfsg-6ubuntu0.1 | 1.50+dfsg-6ubuntu0.1 |
ubuntu/espeak-ng | <1.50+dfsg-10ubuntu0.1 | 1.50+dfsg-10ubuntu0.1 |
ubuntu/espeak-ng | <1.51+dfsg-11ubuntu0.1 | 1.51+dfsg-11ubuntu0.1 |
ubuntu/espeak-ng | <1.51+dfsg-12 | 1.51+dfsg-12 |
debian/espeak-ng | <=1.50+dfsg-7+deb11u1 | 1.51+dfsg-10+deb12u1 1.51+dfsg-12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49992 has a high severity due to the presence of a stack buffer overflow in espeak-ng 1.52-dev.
To fix CVE-2023-49992, update espeak-ng to a version higher than 1.52-dev, such as 1.51+dfsg-12 or the recommended remedied versions for your distribution.
CVE-2023-49992 affects espeak-ng version 1.52-dev.
Yes, CVE-2023-49992's stack buffer overflow can potentially allow remote code execution.
You can find more information about CVE-2023-49992 in discussion threads and issue trackers related to espeak-ng.