Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-44269

Опубликовано: 10 мар. 2022
Источник: debian
EPSS Низкий

Описание

An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c, tainted variable cnt is too large, that makes pointer sptr read beyond heap bound.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wavpackfixed5.5.0-1package

Примечания

  • https://github.com/dbry/WavPack/issues/110

  • Fixed by: https://github.com/dbry/WavPack/commit/773f9d0803c6888ae7d5391878d7337f24216f4a

  • Negligible security impact; only impacts the CLI program

EPSS

Процентиль: 31%
0.00117
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 4 года назад

An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c, tainted variable cnt is too large, that makes pointer sptr read beyond heap bound.

CVSS3: 3.5
redhat
около 4 лет назад

An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c, tainted variable cnt is too large, that makes pointer sptr read beyond heap bound.

CVSS3: 5.5
nvd
почти 4 года назад

An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c, tainted variable cnt is too large, that makes pointer sptr read beyond heap bound.

CVSS3: 5.5
msrc
почти 4 года назад

An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c tainted variable cnt is too large that makes pointer sptr read beyond heap bound.

suse-cvrf
почти 4 года назад

Security update for wavpack

EPSS

Процентиль: 31%
0.00117
Низкий