{"id":"CVE-2019-11498","details":"WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a \"Conditional jump or move depends on uninitialised value\" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.","modified":"2026-04-16T04:39:24.418725833Z","published":"2019-04-24T05:29:00.783Z","related":["ALSA-2020:1581","SUSE-SU-2019:2191-1","SUSE-SU-2021:0186-1","openSUSE-SU-2019:2067-1","openSUSE-SU-2021:0153-1","openSUSE-SU-2021:0154-1","openSUSE-SU-2024:11505-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SCK2YJXY6V5CKGKSF2PPN7RL2DXVOC6G/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZDKXGA2ZNSSM64ZYDHOWCO4Q4VAKAON/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202007-19"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3960-1/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html"},{"type":"REPORT","url":"https://github.com/dbry/WavPack/issues/67"},{"type":"FIX","url":"https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dbry/wavpack","events":[{"introduced":"0"},{"last_affected":"9ccc3fe4a37d069137ceabe513a4dd9b0a09c1c2"},{"fixed":"bc6cba3f552c44565f7f1e66dc1580189addb2b4"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.1.0"}]}}],"versions":["4.70.0","4.70.0-rc","4.75.0","4.75.0-rc","4.75.2","4.80.0","4.80.0-rc","5.0.0","5.0.0-alpha","5.0.0-alpha2","5.0.0-alpha3","5.0.0-alpha4","5.0.0-alpha5","5.1.0"],"database_specific":{"vanir_signatures_modified":"2026-04-11T08:55:46Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-11498.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"vanir_signatures":[{"id":"CVE-2019-11498-81f9996e","signature_type":"Function","source":"https://github.com/dbry/wavpack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4","signature_version":"v1","digest":{"length":6984,"function_hash":"132088661155758866226078285105533531453"},"deprecated":false,"target":{"file":"cli/dsdiff.c","function":"ParseDsdiffHeaderConfig"}},{"id":"CVE-2019-11498-cfcf618e","signature_type":"Line","source":"https://github.com/dbry/wavpack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["336981810097622692200994177206599183851","38043709586898049670829852933480895655","36842375887694530035306644760993781548","39925721679759598168557023433733121236","229707412180059492805503631299366817889","124443822127856135393523339437485948397","86820302825052236836958890833787597446","37602213586670355273543741874317807099"]},"deprecated":false,"target":{"file":"cli/dsdiff.c"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}