File _patchinfo of Package patchinfo.34879
<patchinfo incident="34879"> <issue tracker="cve" id="2023-49991"/> <issue tracker="cve" id="2023-49992"/> <issue tracker="cve" id="2023-49993"/> <issue tracker="cve" id="2023-49990"/> <issue tracker="cve" id="2023-49994"/> <issue tracker="bnc" id="1218009">VUL-0: CVE-2023-49994: espeak-ng: floating point exception in PeaksToHarmspect at wavegen.c</issue> <issue tracker="bnc" id="1218007">VUL-0: CVE-2023-49992: espeak-ng: stack-buffer-overflow exists in the function RemoveEnding in dictionary.c</issue> <issue tracker="bnc" id="1218006">VUL-0: CVE-2023-49991: espeak-ng: stack-buffer-underflow exists in the function CountVowelPosition in synthdata.c</issue> <issue tracker="bnc" id="1218008">VUL-0: CVE-2023-49993: espeak-ng: buffer overflow in ReadClause function at readclause.c</issue> <issue tracker="bnc" id="1218010">VUL-0: CVE-2023-49990: espeak-ng: buffer overflow in SetUpPhonemeTable function at synthdata.c</issue> <packager>qzhao</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for espeak-ng</summary> <description>This update for espeak-ng fixes the following issues: - CVE-2023-49990: Fixed buffer overflow in SetUpPhonemeTable function at synthdata.c (bsc#1218010) - CVE-2023-49991: Fixed stack-buffer-underflow exists in the function CountVowelPosition in synthdata.c (bsc#1218006) - CVE-2023-49992: Fixed stack-buffer-overflow exists in the function RemoveEnding in dictionary.c (bsc#1218007) - CVE-2023-49993: Fixed buffer overflow in ReadClause function at readclause.c (bsc#1218008) - CVE-2023-49994: Fixed floating point exception in PeaksToHarmspect at wavegen.c (bsc#1218009) </description> </patchinfo>