{"id":"CVE-2019-1010319","details":"WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe.","modified":"2026-04-11T08:55:40.712521Z","published":"2019-07-11T20:15:12.367Z","related":["ALSA-2020:1581","MGASA-2019-0230","MGASA-2019-0231","SUSE-SU-2019:2191-1","SUSE-SU-2021:0186-1","openSUSE-SU-2019:2067-1","openSUSE-SU-2021:0153-1","openSUSE-SU-2021:0154-1","openSUSE-SU-2024:11505-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IX3J2JML5A7KC2BLGBEFTIIZR3EM7LVJ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYESOAZ6Z6IG4BQBURL6OUY6P4YB6SKS/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4062-1/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html"},{"type":"REPORT","url":"https://github.com/dbry/WavPack/issues/68"},{"type":"FIX","url":"https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dbry/wavpack","events":[{"introduced":"0"},{"last_affected":"9ccc3fe4a37d069137ceabe513a4dd9b0a09c1c2"},{"fixed":"33a0025d1d63ccd05d9dbaa6923d52b1446a62fe"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.1.0"}]}}],"versions":["4.70.0","4.70.0-rc","4.75.0","4.75.0-rc","4.75.2","4.80.0","4.80.0-rc","5.0.0","5.0.0-alpha","5.0.0-alpha2","5.0.0-alpha3","5.0.0-alpha4","5.0.0-alpha5","5.1.0"],"database_specific":{"vanir_signatures":[{"source":"https://github.com/dbry/wavpack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe","signature_version":"v1","signature_type":"Line","deprecated":false,"digest":{"line_hashes":["122404160467285183712511770525712175680","285219514396165490106202596329857256961","329377426616782729961540193952241123862"],"threshold":0.9},"id":"CVE-2019-1010319-38995bcb","target":{"file":"cli/wave64.c"}},{"source":"https://github.com/dbry/wavpack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe","signature_version":"v1","signature_type":"Function","deprecated":false,"digest":{"length":6740,"function_hash":"164572977520454645612894174087013665163"},"id":"CVE-2019-1010319-9c2e723c","target":{"function":"ParseWave64HeaderConfig","file":"cli/wave64.c"}}],"vanir_signatures_modified":"2026-04-11T08:55:40Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1010319.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}