MGASA-2022-0125

Source
https://advisories.mageia.org/MGASA-2022-0125.html
Import Source
https://advisories.mageia.org/MGASA-2022-0125.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0125
Related
Published
2022-03-31T19:55:37Z
Modified
2022-03-31T19:11:19Z
Summary
Updated wavpack packages fix security vulnerability
Details

An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c, tainted variable cnt is too large, that makes pointer sptr read beyond heap bound. (CVE-2021-44269)

References
Credits

Affected packages

Mageia:8 / wavpack

Package

Name
wavpack
Purl
pkg:rpm/mageia/wavpack?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.2-2.1.mga8

Ecosystem specific

{
    "section": "core"
}