Name | CVE-2023-32627 |
Description | A floating point exception vulnerability was found in sox, in the read_samples function at sox/src/voc.c:334:18. This flaw can lead to a denial of service. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3527-1, ELA-918-1 |
Debian Bugs | 1041112 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
sox (PTS) | jessie, jessie (lts) | 14.4.1-5+deb8u7 | fixed |
| stretch (lts), stretch | 14.4.1-5+deb9u5 | fixed |
| buster (security), buster, buster (lts) | 14.4.2+git20190427-1+deb10u3 | fixed |
| bullseye (security), bullseye | 14.4.2+git20190427-2+deb11u2 | vulnerable |
| bookworm | 14.4.2+git20190427-3.5 | vulnerable |
| sid, trixie | 14.4.2+git20190427-5 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - sox <no-dsa> (Minor issue)
[bullseye] - sox <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=2212282
https://sourceforge.net/p/sox/bugs/369/
POC posted upstream is masked by fix of CVE-2021-3643, however sampling rate == 0,
thus FPE is not fixed by CVE-2021-3643
Proposed patch: https://sourceforge.net/p/sox/bugs/_discuss/thread/e759e37389/2ead/attachment/0026-CVE-2023-32627-Filter-null-sampling-rate-in-VOC-code.patch