Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-1010315 (GCVE-0-2019-1010315)
Vulnerability from cvelistv5
Published
2019-07-11 19:34
Modified
2024-08-05 03:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE 369: Divide by Zero
Summary
WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:07:18.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dbry/WavPack/issues/65" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc" }, { "name": "USN-4062-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4062-1/" }, { "name": "FEDORA-2020-e55567b6be", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/" }, { "name": "FEDORA-2020-73274c9df4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/" }, { "name": "[debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WavPack", "vendor": "WavPack", "versions": [ { "status": "affected", "version": "\u003c=5.1 [fixed: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc]" } ] } ], "descriptions": [ { "lang": "en", "value": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE 369: Divide by Zero", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-15T12:06:15", "orgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "shortName": "dwf" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dbry/WavPack/issues/65" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc" }, { "name": "USN-4062-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4062-1/" }, { "name": "FEDORA-2020-e55567b6be", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/" }, { "name": "FEDORA-2020-73274c9df4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/" }, { "name": "[debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WavPack", "version": { "version_data": [ { "version_value": "\u003c=5.1 [fixed: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc]" } ] } } ] }, "vendor_name": "WavPack" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE 369: Divide by Zero" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/dbry/WavPack/issues/65", "refsource": "MISC", "url": "https://github.com/dbry/WavPack/issues/65" }, { "name": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc", "refsource": "MISC", "url": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc" }, { "name": "USN-4062-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4062-1/" }, { "name": "FEDORA-2020-e55567b6be", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/" }, { "name": "FEDORA-2020-73274c9df4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/" }, { "name": "[debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "7556d962-6fb7-411e-85fa-6cd62f095ba8", "assignerShortName": "dwf", "cveId": "CVE-2019-1010315", "datePublished": "2019-07-11T19:34:35", "dateReserved": "2019-03-20T00:00:00", "dateUpdated": "2024-08-05T03:07:18.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-1010315\",\"sourceIdentifier\":\"josh@bress.net\",\"published\":\"2019-07-11T20:15:12.100\",\"lastModified\":\"2024-11-21T04:18:09.667\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.\"},{\"lang\":\"es\",\"value\":\"WavPack versiones 5.1 y anteriores, esta afectado por: CWE 369: Divisi\u00f3n por Cero. El impacto es: Dividir por cero puede conllevar a un bloqueo repentino de un software y servicio que intenta analizar un archivo .wav. El componente es: ParseDsdiffHeaderConfig (en el archivo dsdiff.c:282). El vector de ataque es: archivo .wav malicioso. La versi\u00f3n corregida es: Despu\u00e9s del commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-369\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wavpack:wavpack:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.1.0\",\"matchCriteriaId\":\"A5AF1FF6-17E5-429C-8280-8215E7010571\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}]}]}],\"references\":[{\"url\":\"https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc\",\"source\":\"josh@bress.net\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/dbry/WavPack/issues/65\",\"source\":\"josh@bress.net\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html\",\"source\":\"josh@bress.net\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/\",\"source\":\"josh@bress.net\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/\",\"source\":\"josh@bress.net\"},{\"url\":\"https://usn.ubuntu.com/4062-1/\",\"source\":\"josh@bress.net\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/dbry/WavPack/issues/65\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4062-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
fkie_cve-2019-1010315
Vulnerability from fkie_nvd
Published
2019-07-11 20:15
Modified
2024-11-21 04:18
Severity ?
Summary
WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.
References
▶ | URL | Tags | |
---|---|---|---|
josh@bress.net | https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc | Patch, Third Party Advisory | |
josh@bress.net | https://github.com/dbry/WavPack/issues/65 | Exploit, Issue Tracking, Third Party Advisory | |
josh@bress.net | https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html | Mailing List, Third Party Advisory | |
josh@bress.net | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/ | ||
josh@bress.net | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/ | ||
josh@bress.net | https://usn.ubuntu.com/4062-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/dbry/WavPack/issues/65 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4062-1/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wavpack | wavpack | * | |
fedoraproject | fedora | 30 | |
fedoraproject | fedora | 31 | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wavpack:wavpack:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5AF1FF6-17E5-429C-8280-8215E7010571", "versionEndIncluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc." }, { "lang": "es", "value": "WavPack versiones 5.1 y anteriores, esta afectado por: CWE 369: Divisi\u00f3n por Cero. El impacto es: Dividir por cero puede conllevar a un bloqueo repentino de un software y servicio que intenta analizar un archivo .wav. El componente es: ParseDsdiffHeaderConfig (en el archivo dsdiff.c:282). El vector de ataque es: archivo .wav malicioso. La versi\u00f3n corregida es: Despu\u00e9s del commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc." } ], "id": "CVE-2019-1010315", "lastModified": "2024-11-21T04:18:09.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-11T20:15:12.100", "references": [ { "source": "josh@bress.net", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc" }, { "source": "josh@bress.net", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/issues/65" }, { "source": "josh@bress.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html" }, { "source": "josh@bress.net", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/" }, { "source": "josh@bress.net", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/" }, { "source": "josh@bress.net", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4062-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/issues/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4062-1/" } ], "sourceIdentifier": "josh@bress.net", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-369" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-4jm9-v433-wx3f
Vulnerability from github
Published
2022-05-24 16:50
Modified
2022-10-07 18:15
Severity ?
VLAI Severity ?
Details
WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.
{ "affected": [], "aliases": [ "CVE-2019-1010315" ], "database_specific": { "cwe_ids": [ "CWE-369" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-11T20:15:00Z", "severity": "MODERATE" }, "details": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.", "id": "GHSA-4jm9-v433-wx3f", "modified": "2022-10-07T18:15:49Z", "published": "2022-05-24T16:50:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010315" }, { "type": "WEB", "url": "https://github.com/dbry/WavPack/issues/65" }, { "type": "WEB", "url": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH" }, { "type": "WEB", "url": "https://usn.ubuntu.com/4062-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2020:1581
Vulnerability from csaf_redhat
Published
2020-04-28 15:38
Modified
2025-03-17 02:10
Summary
Red Hat Security Advisory: wavpack security update
Notes
Topic
An update for wavpack is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WavPack is a completely open audio compression format providing lossless, high-quality lossy, and a unique hybrid compression mode.
Security Fix(es):
* wawpack: Infinite loop in WavpackPackInit function lead to DoS (CVE-2018-19840)
* wawpack: Out-of-bounds read in WavpackVerifySingleBlock function leads to DoS (CVE-2018-19841)
* wavpack: Use of uninitialized variable in WavpackSetConfiguration64 leads to DoS (CVE-2019-11498)
* wavpack: Divide by zero in ParseDsdiffHeaderConfig leads to crash (CVE-2019-1010315)
* wavpack: Use of uninitialized variable in ParseCaffHeaderConfig leads to DoS (CVE-2019-1010317)
* wavpack: Use of uninitialized variable in ParseWave64HeaderConfig leads to DoS (CVE-2019-1010319)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for wavpack is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WavPack is a completely open audio compression format providing lossless, high-quality lossy, and a unique hybrid compression mode. \n\nSecurity Fix(es):\n\n* wawpack: Infinite loop in WavpackPackInit function lead to DoS (CVE-2018-19840)\n\n* wawpack: Out-of-bounds read in WavpackVerifySingleBlock function leads to DoS (CVE-2018-19841)\n\n* wavpack: Use of uninitialized variable in WavpackSetConfiguration64 leads to DoS (CVE-2019-11498)\n\n* wavpack: Divide by zero in ParseDsdiffHeaderConfig leads to crash (CVE-2019-1010315)\n\n* wavpack: Use of uninitialized variable in ParseCaffHeaderConfig leads to DoS (CVE-2019-1010317)\n\n* wavpack: Use of uninitialized variable in ParseWave64HeaderConfig leads to DoS (CVE-2019-1010319)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1581", "url": "https://access.redhat.com/errata/RHSA-2020:1581" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index" }, { "category": "external", "summary": "1661448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661448" }, { "category": "external", "summary": "1661449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661449" }, { "category": "external", "summary": "1704633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704633" }, { "category": "external", "summary": "1729418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729418" }, { "category": "external", "summary": "1737740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737740" }, { "category": "external", "summary": "1737747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1581.json" } ], "title": "Red Hat Security Advisory: wavpack security update", "tracking": { "current_release_date": "2025-03-17T02:10:11+00:00", "generator": { "date": "2025-03-17T02:10:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.4.1" } }, "id": "RHSA-2020:1581", "initial_release_date": "2020-04-28T15:38:18+00:00", "revision_history": [ { "date": "2020-04-28T15:38:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-28T15:38:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-03-17T02:10:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "wavpack-0:5.1.0-15.el8.i686", "product": { "name": "wavpack-0:5.1.0-15.el8.i686", "product_id": "wavpack-0:5.1.0-15.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack@5.1.0-15.el8?arch=i686" } } }, { "category": "product_version", "name": "wavpack-debugsource-0:5.1.0-15.el8.i686", "product": { "name": "wavpack-debugsource-0:5.1.0-15.el8.i686", "product_id": "wavpack-debugsource-0:5.1.0-15.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debugsource@5.1.0-15.el8?arch=i686" } } }, { "category": "product_version", "name": "wavpack-debuginfo-0:5.1.0-15.el8.i686", "product": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.i686", "product_id": "wavpack-debuginfo-0:5.1.0-15.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debuginfo@5.1.0-15.el8?arch=i686" } } }, { "category": "product_version", "name": "wavpack-devel-0:5.1.0-15.el8.i686", "product": { "name": "wavpack-devel-0:5.1.0-15.el8.i686", "product_id": "wavpack-devel-0:5.1.0-15.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-devel@5.1.0-15.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "wavpack-0:5.1.0-15.el8.x86_64", "product": { "name": "wavpack-0:5.1.0-15.el8.x86_64", "product_id": "wavpack-0:5.1.0-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack@5.1.0-15.el8?arch=x86_64" } } }, { "category": "product_version", "name": "wavpack-debugsource-0:5.1.0-15.el8.x86_64", "product": { "name": "wavpack-debugsource-0:5.1.0-15.el8.x86_64", "product_id": "wavpack-debugsource-0:5.1.0-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debugsource@5.1.0-15.el8?arch=x86_64" } } }, { "category": "product_version", "name": "wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "product": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "product_id": "wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debuginfo@5.1.0-15.el8?arch=x86_64" } } }, { "category": "product_version", "name": "wavpack-devel-0:5.1.0-15.el8.x86_64", "product": { "name": "wavpack-devel-0:5.1.0-15.el8.x86_64", "product_id": "wavpack-devel-0:5.1.0-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-devel@5.1.0-15.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "wavpack-0:5.1.0-15.el8.ppc64le", "product": { "name": "wavpack-0:5.1.0-15.el8.ppc64le", "product_id": "wavpack-0:5.1.0-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack@5.1.0-15.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "product": { "name": "wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "product_id": "wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debugsource@5.1.0-15.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "product": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "product_id": "wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debuginfo@5.1.0-15.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "wavpack-devel-0:5.1.0-15.el8.ppc64le", "product": { "name": "wavpack-devel-0:5.1.0-15.el8.ppc64le", "product_id": "wavpack-devel-0:5.1.0-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-devel@5.1.0-15.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wavpack-0:5.1.0-15.el8.s390x", "product": { "name": "wavpack-0:5.1.0-15.el8.s390x", "product_id": "wavpack-0:5.1.0-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack@5.1.0-15.el8?arch=s390x" } } }, { "category": "product_version", "name": "wavpack-debugsource-0:5.1.0-15.el8.s390x", "product": { "name": "wavpack-debugsource-0:5.1.0-15.el8.s390x", "product_id": "wavpack-debugsource-0:5.1.0-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debugsource@5.1.0-15.el8?arch=s390x" } } }, { "category": "product_version", "name": "wavpack-debuginfo-0:5.1.0-15.el8.s390x", "product": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.s390x", "product_id": "wavpack-debuginfo-0:5.1.0-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debuginfo@5.1.0-15.el8?arch=s390x" } } }, { "category": "product_version", "name": "wavpack-devel-0:5.1.0-15.el8.s390x", "product": { "name": "wavpack-devel-0:5.1.0-15.el8.s390x", "product_id": "wavpack-devel-0:5.1.0-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-devel@5.1.0-15.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wavpack-0:5.1.0-15.el8.aarch64", "product": { "name": "wavpack-0:5.1.0-15.el8.aarch64", "product_id": "wavpack-0:5.1.0-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack@5.1.0-15.el8?arch=aarch64" } } }, { "category": "product_version", "name": "wavpack-debugsource-0:5.1.0-15.el8.aarch64", "product": { "name": "wavpack-debugsource-0:5.1.0-15.el8.aarch64", "product_id": "wavpack-debugsource-0:5.1.0-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debugsource@5.1.0-15.el8?arch=aarch64" } } }, { "category": "product_version", "name": "wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "product": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "product_id": "wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-debuginfo@5.1.0-15.el8?arch=aarch64" } } }, { "category": "product_version", "name": "wavpack-devel-0:5.1.0-15.el8.aarch64", "product": { "name": "wavpack-devel-0:5.1.0-15.el8.aarch64", "product_id": "wavpack-devel-0:5.1.0-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack-devel@5.1.0-15.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wavpack-0:5.1.0-15.el8.src", "product": { "name": "wavpack-0:5.1.0-15.el8.src", "product_id": "wavpack-0:5.1.0-15.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/wavpack@5.1.0-15.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64" }, "product_reference": "wavpack-0:5.1.0-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686" }, "product_reference": "wavpack-0:5.1.0-15.el8.i686", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le" }, "product_reference": "wavpack-0:5.1.0-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x" }, "product_reference": "wavpack-0:5.1.0-15.el8.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src" }, "product_reference": "wavpack-0:5.1.0-15.el8.src", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64" }, "product_reference": "wavpack-0:5.1.0-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.i686", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.i686", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.i686", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.s390x", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64" }, "product_reference": "wavpack-0:5.1.0-15.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686" }, "product_reference": "wavpack-0:5.1.0-15.el8.i686", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le" }, "product_reference": "wavpack-0:5.1.0-15.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x" }, "product_reference": "wavpack-0:5.1.0-15.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src" }, "product_reference": "wavpack-0:5.1.0-15.el8.src", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-0:5.1.0-15.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64" }, "product_reference": "wavpack-0:5.1.0-15.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.i686", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debuginfo-0:5.1.0-15.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64" }, "product_reference": "wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.i686", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-debugsource-0:5.1.0-15.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64" }, "product_reference": "wavpack-debugsource-0:5.1.0-15.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.aarch64", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.i686", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.ppc64le", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.s390x", "relates_to_product_reference": "CRB-8.2.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-0:5.1.0-15.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" }, "product_reference": "wavpack-devel-0:5.1.0-15.el8.x86_64", "relates_to_product_reference": "CRB-8.2.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-19840", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2018-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661448" } ], "notes": [ { "category": "description", "text": "The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.", "title": "Vulnerability description" }, { "category": "summary", "text": "wawpack: Infinite loop in WavpackPackInit function lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of wavpack as shipped with Red Hat Enterprise Linux 6 and 7.\n\nRed Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19840" }, { "category": "external", "summary": "RHBZ#1661448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661448" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19840", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19840" } ], "release_date": "2018-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:38:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1581" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wawpack: Infinite loop in WavpackPackInit function lead to DoS" }, { "cve": "CVE-2018-19841", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661449" } ], "notes": [ { "category": "description", "text": "The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.", "title": "Vulnerability description" }, { "category": "summary", "text": "wawpack: Out-of-bounds read in WavpackVerifySingleBlock function leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of wavpack as shipped with Red Hat Enterprise Linux 6 and 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19841" }, { "category": "external", "summary": "RHBZ#1661449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19841", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19841" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19841", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19841" } ], "release_date": "2018-11-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:38:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1581" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wawpack: Out-of-bounds read in WavpackVerifySingleBlock function leads to DoS" }, { "cve": "CVE-2019-11498", "cwe": { "id": "CWE-456", "name": "Missing Initialization of a Variable" }, "discovery_date": "2019-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1704633" } ], "notes": [ { "category": "description", "text": "WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a \"Conditional jump or move depends on uninitialised value\" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.", "title": "Vulnerability description" }, { "category": "summary", "text": "wavpack: Use of uninitialized variable in WavpackSetConfiguration64 leads to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11498" }, { "category": "external", "summary": "RHBZ#1704633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704633" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11498", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11498" } ], "release_date": "2019-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:38:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1581" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wavpack: Use of uninitialized variable in WavpackSetConfiguration64 leads to DoS" }, { "cve": "CVE-2019-1010315", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2019-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729418" } ], "notes": [ { "category": "description", "text": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.", "title": "Vulnerability description" }, { "category": "summary", "text": "wavpack: Divide by zero in ParseDsdiffHeaderConfig leads to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects WackPack version as shipped with Red Hat Enterprise Linux 8 and was classified with \u0027Low\u0027 security impact by Red Hat Product Security team.\nRed Hat Enterprise Linux 6 and 7 are not affected as WavPack shipped with both system versions doesn\u0027t provide support for DSD files.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1010315" }, { "category": "external", "summary": "RHBZ#1729418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1010315", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1010315" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010315", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010315" } ], "release_date": "2019-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:38:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1581" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wavpack: Divide by zero in ParseDsdiffHeaderConfig leads to crash" }, { "cve": "CVE-2019-1010317", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737747" } ], "notes": [ { "category": "description", "text": "WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b.", "title": "Vulnerability description" }, { "category": "summary", "text": "wavpack: Use of uninitialized variable in ParseCaffHeaderConfig leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects wavpack versions as shipped with Red Hat Enterprise Linux 8. The security impact for this flaw was calculated as \u0027Low\u0027 by the Red Hat Product Security Team. Previous Red Hat Enterprise Linux versions are not affected as wavpack shipped with it doesn\u0027t support CAF file format, which is needed to reach the code where the flaw resides at.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1010317" }, { "category": "external", "summary": "RHBZ#1737747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737747" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1010317", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1010317" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010317", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010317" } ], "release_date": "2019-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:38:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1581" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wavpack: Use of uninitialized variable in ParseCaffHeaderConfig leads to DoS" }, { "cve": "CVE-2019-1010319", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737740" } ], "notes": [ { "category": "description", "text": "WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe.", "title": "Vulnerability description" }, { "category": "summary", "text": "wavpack: Use of uninitialized variable in ParseWave64HeaderConfig leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of wavpack as shipped with Red Hat Enterprise Linux 8. This flaw has been classified as \u0027Low\u0027 regarding the security impact by the Red Hat Product Security Team.\nRed Hat Enterprise Linux versions prior than the mentioned before are not affected as wavpack shipped with those versions doesn\u0027t support the file format required.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-1010319" }, { "category": "external", "summary": "RHBZ#1737740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737740" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-1010319", "url": "https://www.cve.org/CVERecord?id=CVE-2019-1010319" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010319", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010319" } ], "release_date": "2019-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-28T15:38:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1581" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "AppStream-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "AppStream-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.src", "CRB-8.2.0.GA:wavpack-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debuginfo-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-debugsource-0:5.1.0-15.el8.x86_64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.aarch64", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.i686", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.ppc64le", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.s390x", "CRB-8.2.0.GA:wavpack-devel-0:5.1.0-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wavpack: Use of uninitialized variable in ParseWave64HeaderConfig leads to DoS" } ] }
gsd-2019-1010315
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-1010315", "description": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.", "id": "GSD-2019-1010315", "references": [ "https://www.suse.com/security/cve/CVE-2019-1010315.html", "https://access.redhat.com/errata/RHSA-2020:1581", "https://ubuntu.com/security/CVE-2019-1010315", "https://advisories.mageia.org/CVE-2019-1010315.html", "https://linux.oracle.com/cve/CVE-2019-1010315.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-1010315" ], "details": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.", "id": "GSD-2019-1010315", "modified": "2023-12-13T01:23:50.732790Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WavPack", "version": { "version_data": [ { "version_value": "\u003c=5.1 [fixed: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc]" } ] } } ] }, "vendor_name": "WavPack" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE 369: Divide by Zero" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/dbry/WavPack/issues/65", "refsource": "MISC", "url": "https://github.com/dbry/WavPack/issues/65" }, { "name": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc", "refsource": "MISC", "url": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc" }, { "name": "USN-4062-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4062-1/" }, { "name": "FEDORA-2020-e55567b6be", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/" }, { "name": "FEDORA-2020-73274c9df4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/" }, { "name": "[debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:wavpack:wavpack:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010315" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-369" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/dbry/WavPack/issues/65", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/issues/65" }, { "name": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc" }, { "name": "USN-4062-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4062-1/" }, { "name": "FEDORA-2020-e55567b6be", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/" }, { "name": "FEDORA-2020-73274c9df4", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/" }, { "name": "[debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-10-07T15:06Z", "publishedDate": "2019-07-11T20:15Z" } } }
opensuse-su-2024:11505-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libwavpack1-32bit-5.4.0-1.6 on GA media
Notes
Title of the patch
libwavpack1-32bit-5.4.0-1.6 on GA media
Description of the patch
These are all security issues fixed in the libwavpack1-32bit-5.4.0-1.6 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11505
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libwavpack1-32bit-5.4.0-1.6 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libwavpack1-32bit-5.4.0-1.6 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11505", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11505-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19840 page", "url": "https://www.suse.com/security/cve/CVE-2018-19840/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19841 page", "url": "https://www.suse.com/security/cve/CVE-2018-19841/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-6767 page", "url": "https://www.suse.com/security/cve/CVE-2018-6767/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7253 page", "url": "https://www.suse.com/security/cve/CVE-2018-7253/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7254 page", "url": "https://www.suse.com/security/cve/CVE-2018-7254/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010315 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010315/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010317 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010317/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010318 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010318/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1010319 page", "url": "https://www.suse.com/security/cve/CVE-2019-1010319/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11498 page", "url": "https://www.suse.com/security/cve/CVE-2019-11498/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-35738 page", "url": "https://www.suse.com/security/cve/CVE-2020-35738/" } ], "title": "libwavpack1-32bit-5.4.0-1.6 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11505-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libwavpack1-5.4.0-1.6.aarch64", "product": { "name": "libwavpack1-5.4.0-1.6.aarch64", "product_id": "libwavpack1-5.4.0-1.6.aarch64" } }, { "category": "product_version", "name": "libwavpack1-32bit-5.4.0-1.6.aarch64", "product": { "name": "libwavpack1-32bit-5.4.0-1.6.aarch64", "product_id": "libwavpack1-32bit-5.4.0-1.6.aarch64" } }, { "category": "product_version", "name": "wavpack-5.4.0-1.6.aarch64", "product": { "name": "wavpack-5.4.0-1.6.aarch64", "product_id": "wavpack-5.4.0-1.6.aarch64" } }, { "category": "product_version", "name": "wavpack-devel-5.4.0-1.6.aarch64", "product": { "name": "wavpack-devel-5.4.0-1.6.aarch64", "product_id": "wavpack-devel-5.4.0-1.6.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libwavpack1-5.4.0-1.6.ppc64le", "product": { "name": "libwavpack1-5.4.0-1.6.ppc64le", "product_id": "libwavpack1-5.4.0-1.6.ppc64le" } }, { "category": "product_version", "name": "libwavpack1-32bit-5.4.0-1.6.ppc64le", "product": { "name": "libwavpack1-32bit-5.4.0-1.6.ppc64le", "product_id": "libwavpack1-32bit-5.4.0-1.6.ppc64le" } }, { "category": "product_version", "name": "wavpack-5.4.0-1.6.ppc64le", "product": { "name": "wavpack-5.4.0-1.6.ppc64le", "product_id": "wavpack-5.4.0-1.6.ppc64le" } }, { "category": "product_version", "name": "wavpack-devel-5.4.0-1.6.ppc64le", "product": { "name": "wavpack-devel-5.4.0-1.6.ppc64le", "product_id": "wavpack-devel-5.4.0-1.6.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libwavpack1-5.4.0-1.6.s390x", "product": { "name": "libwavpack1-5.4.0-1.6.s390x", "product_id": "libwavpack1-5.4.0-1.6.s390x" } }, { "category": "product_version", "name": "libwavpack1-32bit-5.4.0-1.6.s390x", "product": { "name": "libwavpack1-32bit-5.4.0-1.6.s390x", "product_id": "libwavpack1-32bit-5.4.0-1.6.s390x" } }, { "category": "product_version", "name": "wavpack-5.4.0-1.6.s390x", "product": { "name": "wavpack-5.4.0-1.6.s390x", "product_id": "wavpack-5.4.0-1.6.s390x" } }, { "category": "product_version", "name": "wavpack-devel-5.4.0-1.6.s390x", "product": { "name": "wavpack-devel-5.4.0-1.6.s390x", "product_id": "wavpack-devel-5.4.0-1.6.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libwavpack1-5.4.0-1.6.x86_64", "product": { "name": "libwavpack1-5.4.0-1.6.x86_64", "product_id": "libwavpack1-5.4.0-1.6.x86_64" } }, { "category": "product_version", "name": "libwavpack1-32bit-5.4.0-1.6.x86_64", "product": { "name": "libwavpack1-32bit-5.4.0-1.6.x86_64", "product_id": "libwavpack1-32bit-5.4.0-1.6.x86_64" } }, { "category": "product_version", "name": "wavpack-5.4.0-1.6.x86_64", "product": { "name": "wavpack-5.4.0-1.6.x86_64", "product_id": "wavpack-5.4.0-1.6.x86_64" } }, { "category": "product_version", "name": "wavpack-devel-5.4.0-1.6.x86_64", "product": { "name": "wavpack-devel-5.4.0-1.6.x86_64", "product_id": "wavpack-devel-5.4.0-1.6.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libwavpack1-5.4.0-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64" }, "product_reference": "libwavpack1-5.4.0-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwavpack1-5.4.0-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le" }, "product_reference": "libwavpack1-5.4.0-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwavpack1-5.4.0-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x" }, "product_reference": "libwavpack1-5.4.0-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwavpack1-5.4.0-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64" }, "product_reference": "libwavpack1-5.4.0-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwavpack1-32bit-5.4.0-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64" }, "product_reference": "libwavpack1-32bit-5.4.0-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwavpack1-32bit-5.4.0-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le" }, "product_reference": "libwavpack1-32bit-5.4.0-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwavpack1-32bit-5.4.0-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x" }, "product_reference": "libwavpack1-32bit-5.4.0-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libwavpack1-32bit-5.4.0-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64" }, "product_reference": "libwavpack1-32bit-5.4.0-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-5.4.0-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64" }, "product_reference": "wavpack-5.4.0-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-5.4.0-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le" }, "product_reference": "wavpack-5.4.0-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-5.4.0-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x" }, "product_reference": "wavpack-5.4.0-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-5.4.0-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64" }, "product_reference": "wavpack-5.4.0-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-5.4.0-1.6.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64" }, "product_reference": "wavpack-devel-5.4.0-1.6.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-5.4.0-1.6.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le" }, "product_reference": "wavpack-devel-5.4.0-1.6.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-5.4.0-1.6.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x" }, "product_reference": "wavpack-devel-5.4.0-1.6.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wavpack-devel-5.4.0-1.6.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" }, "product_reference": "wavpack-devel-5.4.0-1.6.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-19840", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19840" } ], "notes": [ { "category": "general", "text": "The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19840", "url": "https://www.suse.com/security/cve/CVE-2018-19840" }, { "category": "external", "summary": "SUSE Bug 1120930 for CVE-2018-19840", "url": "https://bugzilla.suse.com/1120930" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-19840" }, { "cve": "CVE-2018-19841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19841" } ], "notes": [ { "category": "general", "text": "The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19841", "url": "https://www.suse.com/security/cve/CVE-2018-19841" }, { "category": "external", "summary": "SUSE Bug 1120929 for CVE-2018-19841", "url": "https://bugzilla.suse.com/1120929" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-19841" }, { "cve": "CVE-2018-6767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-6767" } ], "notes": [ { "category": "general", "text": "A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-6767", "url": "https://www.suse.com/security/cve/CVE-2018-6767" }, { "category": "external", "summary": "SUSE Bug 1079746 for CVE-2018-6767", "url": "https://bugzilla.suse.com/1079746" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-6767" }, { "cve": "CVE-2018-7253", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7253" } ], "notes": [ { "category": "general", "text": "The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7253", "url": "https://www.suse.com/security/cve/CVE-2018-7253" }, { "category": "external", "summary": "SUSE Bug 1081692 for CVE-2018-7253", "url": "https://bugzilla.suse.com/1081692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-7253" }, { "cve": "CVE-2018-7254", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7254" } ], "notes": [ { "category": "general", "text": "The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7254", "url": "https://www.suse.com/security/cve/CVE-2018-7254" }, { "category": "external", "summary": "SUSE Bug 1081693 for CVE-2018-7254", "url": "https://bugzilla.suse.com/1081693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-7254" }, { "cve": "CVE-2019-1010315", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010315" } ], "notes": [ { "category": "general", "text": "WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010315", "url": "https://www.suse.com/security/cve/CVE-2019-1010315" }, { "category": "external", "summary": "SUSE Bug 1141337 for CVE-2019-1010315", "url": "https://bugzilla.suse.com/1141337" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-1010315" }, { "cve": "CVE-2019-1010317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010317" } ], "notes": [ { "category": "general", "text": "WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010317", "url": "https://www.suse.com/security/cve/CVE-2019-1010317" }, { "category": "external", "summary": "SUSE Bug 1141339 for CVE-2019-1010317", "url": "https://bugzilla.suse.com/1141339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-1010317" }, { "cve": "CVE-2019-1010318", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010318" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-11498. Reason: This candidate is a reservation duplicate of CVE-2019-11498. Notes: All CVE users should reference CVE-2019-11498 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010318", "url": "https://www.suse.com/security/cve/CVE-2019-1010318" }, { "category": "external", "summary": "SUSE Bug 1141338 for CVE-2019-1010318", "url": "https://bugzilla.suse.com/1141338" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-1010318" }, { "cve": "CVE-2019-1010319", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1010319" } ], "notes": [ { "category": "general", "text": "WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1010319", "url": "https://www.suse.com/security/cve/CVE-2019-1010319" }, { "category": "external", "summary": "SUSE Bug 1141334 for CVE-2019-1010319", "url": "https://bugzilla.suse.com/1141334" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-1010319" }, { "cve": "CVE-2019-11498", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11498" } ], "notes": [ { "category": "general", "text": "WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a \"Conditional jump or move depends on uninitialised value\" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11498", "url": "https://www.suse.com/security/cve/CVE-2019-11498" }, { "category": "external", "summary": "SUSE Bug 1133384 for CVE-2019-11498", "url": "https://bugzilla.suse.com/1133384" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-11498" }, { "cve": "CVE-2020-35738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-35738" } ], "notes": [ { "category": "general", "text": "WavPack 5.3.0 has an out-of-bounds write in WavpackPackSamples in pack_utils.c because of an integer overflow in a malloc argument. NOTE: some third-parties claim that there are later \"unofficial\" releases through 5.3.2, which are also affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-35738", "url": "https://www.suse.com/security/cve/CVE-2020-35738" }, { "category": "external", "summary": "SUSE Bug 1180414 for CVE-2020-35738", "url": "https://bugzilla.suse.com/1180414" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-32bit-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.s390x", "openSUSE Tumbleweed:libwavpack1-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-5.4.0-1.6.x86_64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.aarch64", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.ppc64le", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.s390x", "openSUSE Tumbleweed:wavpack-devel-5.4.0-1.6.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-35738" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…