wavpack: CVE-2019-11498: Uninitialized Read in WavpackSetConfiguration64()

Related Vulnerabilities: CVE-2019-11498  

Debian Bug report logs - #927903
wavpack: CVE-2019-11498: Uninitialized Read in WavpackSetConfiguration64()

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Wed, 24 Apr 2019 20:27:02 UTC

Severity: important

Tags: security, upstream

Found in versions wavpack/5.0.0-2+deb9u2, wavpack/5.1.0-5

Fixed in version wavpack/5.1.0-6

Done: Sebastian Ramacher <sramacher@debian.org>

Bug is archived. No further changes may be made.

Forwarded to https://github.com/dbry/WavPack/issues/67

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian Multimedia Maintainers <debian-multimedia@lists.debian.org>:
Bug#927903; Package src:wavpack. (Wed, 24 Apr 2019 20:27:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian Multimedia Maintainers <debian-multimedia@lists.debian.org>. (Wed, 24 Apr 2019 20:27:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: wavpack: CVE-2019-11498: Uninitialized Read in WavpackSetConfiguration64()
Date: Wed, 24 Apr 2019 22:24:50 +0200
Source: wavpack
Version: 5.1.0-5
Severity: important
Tags: security upstream
Forwarded: https://github.com/dbry/WavPack/issues/67

Hi,

The following vulnerability was published for wavpack.

CVE-2019-11498[0]:
| WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack
| through 5.1.0 has a "Conditional jump or move depends on uninitialised
| value" condition, which might allow attackers to cause a denial of
| service (application crash) via a DFF file that lacks valid sample-
| rate data.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-11498
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11498
[1] https://github.com/dbry/WavPack/issues/67
[2] https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Marked as found in versions wavpack/5.0.0-2+deb9u2. Request was from Sebastian Ramacher <sramacher@debian.org> to control@bugs.debian.org. (Sun, 28 Apr 2019 21:39:03 GMT) (full text, mbox, link).


Reply sent to Sebastian Ramacher <sramacher@debian.org>:
You have taken responsibility. (Sun, 28 Apr 2019 21:51:04 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 28 Apr 2019 21:51:04 GMT) (full text, mbox, link).


Message #12 received at 927903-close@bugs.debian.org (full text, mbox, reply):

From: Sebastian Ramacher <sramacher@debian.org>
To: 927903-close@bugs.debian.org
Subject: Bug#927903: fixed in wavpack 5.1.0-6
Date: Sun, 28 Apr 2019 21:49:29 +0000
Source: wavpack
Source-Version: 5.1.0-6

We believe that the bug you reported is fixed in the latest version of
wavpack, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 927903@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Ramacher <sramacher@debian.org> (supplier of updated wavpack package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 28 Apr 2019 23:30:18 +0200
Source: wavpack
Architecture: source
Version: 5.1.0-6
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers <debian-multimedia@lists.debian.org>
Changed-By: Sebastian Ramacher <sramacher@debian.org>
Closes: 927903
Changes:
 wavpack (5.1.0-6) unstable; urgency=medium
 .
   * debian/patches: Cherry-pick upstream patches to fix use of uninitialized
     values. (CVE-2019-11498) (Closes: #927903)
Checksums-Sha1:
 578a3fb097c4bbc8f5725edd3481c959753ff3de 2056 wavpack_5.1.0-6.dsc
 c95b71e7209594ab4a9a56997d85eed1544f22db 10860 wavpack_5.1.0-6.debian.tar.xz
Checksums-Sha256:
 aa5c3b5103146353f5202a27d769467230605671f2ce2f82b90a5d4929374b89 2056 wavpack_5.1.0-6.dsc
 2802722260e7e95dcfc25d8d6704f5dea80018797fd583537baec4b7729993b4 10860 wavpack_5.1.0-6.debian.tar.xz
Files:
 90a77c1d4b1ea59cbd14960516d98c27 2056 sound optional wavpack_5.1.0-6.dsc
 866a481f91cedc74a2287364c47a0c2d 10860 sound optional wavpack_5.1.0-6.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=Kc7L
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 01 Jun 2019 07:25:15 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:45:11 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.