It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3832 | Issue Tracking Patch Third Party Advisory | 
| https://github.com/erikd/libsndfile/issues/456 | Exploit Third Party Advisory | 
| https://github.com/erikd/libsndfile/pull/460 | Patch Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html | Mailing List Third Party Advisory | 
| https://security.gentoo.org/glsa/202007-65 | Third Party Advisory | 
| https://usn.ubuntu.com/4013-1/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
Configuration 3 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2019-03-21 16:01
Updated : 2023-03-01 18:02
NVD link : CVE-2019-3832
Mitre link : CVE-2019-3832
CVE.ORG link : CVE-2019-3832
JSON object : View
Products Affected
                debian
- debian_linux
 
canonical
- ubuntu_linux
 
libsndfile_project
- libsndfile
 
CWE
                
                    
                        
                        CWE-125
                        
            Out-of-bounds Read
