CVE-2023-32627

NameCVE-2023-32627
DescriptionA floating point exception vulnerability was found in sox, in the read_samples function at sox/src/voc.c:334:18. This flaw can lead to a denial of service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3527-1, ELA-918-1
Debian Bugs1041112

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sox (PTS)jessie, jessie (lts)14.4.1-5+deb8u7fixed
stretch (lts), stretch14.4.1-5+deb9u5fixed
buster (security), buster, buster (lts)14.4.2+git20190427-1+deb10u3fixed
bullseye (security), bullseye14.4.2+git20190427-2+deb11u2vulnerable
bookworm14.4.2+git20190427-3.5vulnerable
sid, trixie14.4.2+git20190427-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
soxsourcejessie14.4.1-5+deb8u7ELA-918-1
soxsourcestretch14.4.1-5+deb9u5ELA-918-1
soxsourcebuster14.4.2+git20190427-1+deb10u3DLA-3527-1
soxsource(unstable)14.4.2+git20190427-41041112

Notes

[bookworm] - sox <no-dsa> (Minor issue)
[bullseye] - sox <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=2212282
https://sourceforge.net/p/sox/bugs/369/
POC posted upstream is masked by fix of CVE-2021-3643, however sampling rate == 0,
thus FPE is not fixed by CVE-2021-3643
Proposed patch: https://sourceforge.net/p/sox/bugs/_discuss/thread/e759e37389/2ead/attachment/0026-CVE-2023-32627-Filter-null-sampling-rate-in-VOC-code.patch

Search for package or bug name: Reporting problems