{"id":"CVE-2019-1010317","details":"WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b.","modified":"2026-04-16T04:33:10.950032454Z","published":"2019-07-11T20:15:12.227Z","related":["ALSA-2020:1581","openSUSE-SU-2024:11505-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYESOAZ6Z6IG4BQBURL6OUY6P4YB6SKS/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX3J2JML5A7KC2BLGBEFTIIZR3EM7LVJ/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4062-1/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html"},{"type":"REPORT","url":"https://github.com/dbry/WavPack/issues/66"},{"type":"FIX","url":"https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dbry/wavpack","events":[{"introduced":"0"},{"last_affected":"9ccc3fe4a37d069137ceabe513a4dd9b0a09c1c2"},{"fixed":"f68a9555b548306c5b1ee45199ccdc4a16a6101b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.1.0"}]}}],"versions":["4.70.0","4.70.0-rc","4.75.0","4.75.0-rc","4.75.2","4.80.0","4.80.0-rc","5.0.0","5.0.0-alpha","5.0.0-alpha2","5.0.0-alpha3","5.0.0-alpha4","5.0.0-alpha5","5.1.0"],"database_specific":{"vanir_signatures_modified":"2026-04-11T08:55:40Z","vanir_signatures":[{"signature_version":"v1","target":{"function":"ParseCaffHeaderConfig","file":"cli/caff.c"},"id":"CVE-2019-1010317-2deade7e","source":"https://github.com/dbry/wavpack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b","deprecated":false,"digest":{"function_hash":"80991656525026975324078027612999430066","length":11022},"signature_type":"Function"},{"signature_version":"v1","target":{"file":"cli/caff.c"},"id":"CVE-2019-1010317-3f06a6ab","source":"https://github.com/dbry/wavpack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b","deprecated":false,"digest":{"line_hashes":["207282036086540382901223437960274206226","295277005122744263621529808549708633693","337671784419228819593293206671993219193","168076874139691416387418067897600433450","242159319118789201639797942065816862095","183039602759297547670920798511018539299","101052414796787229135530354972511976988","278336399402704226067780038366185926937","100407542647608178177346719891605124341","165743405433883728473423841452480822066","331630113680726530398711294304434144857","211962050958395306744747486734170649564"],"threshold":0.9},"signature_type":"Line"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1010317.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}