Bug 1542550 (CVE-2018-6767)

Summary: CVE-2018-6767 wavpack: stack buffer overread via crafted wav file
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: lemenkov, mlichvar, sergio, valtri
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds stack buffer read flaw was found in WavPack. This flaw could potentially be used to crash WavPack CLI utilities by tricking them into processing specially crafted WAVE files.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-07-12 13:05:02 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1542551, 1542552, 1543293    
Bug Blocks: 1542555    

Description Laura Pardo 2018-02-06 14:55:22 UTC
A flaw was found in wavpack 5.1.0-2. Running 'wavpack -y poc.wav' with a maliciously crafted file could cause the application to crash, which may allow an attacker to perform a denial-of-service attack.


Upstream bug:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889276
https://github.com/dbry/WavPack/issues/27

Upstream patch:
https://github.com/dbry/WavPack/commit/d5bf76b5a88d044a1be1d5656698e3ba737167e5

Comment 1 Laura Pardo 2018-02-06 14:55:55 UTC
Created mingw-wavpack tracking bugs for this issue:

Affects: epel-7 [bug 1542551]


Created wavpack tracking bugs for this issue:

Affects: fedora-all [bug 1542552]

Comment 7 Product Security DevOps Team 2019-07-12 13:05:02 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-6767