Bug 1661448 (CVE-2018-19840)

Summary: CVE-2018-19840 wawpack: Infinite loop in WavpackPackInit function lead to DoS
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: abhgupta, dbaker, jokerman, mlichvar, rh-spice-bugs, sthangav, trankin
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-28 16:32:20 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1661450, 1661451, 1661452, 1663153, 1663154, 1663155    
Bug Blocks: 1661453    

Description Andrej Nemec 2018-12-21 09:52:31 UTC
The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.

Upstream issue:


Upstream patch:


Comment 1 Andrej Nemec 2018-12-21 09:54:05 UTC
Created mingw-wavpack tracking bugs for this issue:

Affects: epel-7 [bug 1661452]
Affects: fedora-all [bug 1661451]

Created wavpack tracking bugs for this issue:

Affects: fedora-all [bug 1661450]

Comment 3 Stefan Cornelius 2019-01-03 10:18:52 UTC

This issue affects the versions of wavpack as shipped with Red Hat Enterprise Linux 6 and 7.

Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Low, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Comment 5 errata-xmlrpc 2020-04-28 15:27:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:1581 https://access.redhat.com/errata/RHSA-2020:1581

Comment 6 Product Security DevOps Team 2020-04-28 16:32:20 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):