Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at

Bug 2064457 (CVE-2021-44269)

Summary: CVE-2021-44269 wavpack: Heap out-of-bounds read in WavpackPackSamples()
Product: [Other] Security Response Reporter: Nick Tait <ntait>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: fhrdina, lemenkov, rh-spice-bugs, tkorbar, valtri
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A heap out-of-bounds read flaw was found in WavPacks' WavpackPackSamples() function of src/pack_utils.c and only affects the command-line program of WavPack (not libwavpack). This flaw allows an attacker to exploit this flaw for a website that uses the WavPack command-line program on user-provided files, causing a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-06 23:33:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 2067997, 2067998, 2067999, 2068000, 2068001    
Bug Blocks:    

Description Nick Tait 2022-03-15 22:05:30 UTC
A heap out of bounds read vulnerability was discovered in the function WavpackPackSamples().

Comment 3 TEJ RATHI 2022-03-24 08:47:30 UTC
Created mingw-wavpack tracking bugs for this issue:

Affects: fedora-all [bug 2067998]

Created wavpack tracking bugs for this issue:

Affects: fedora-all [bug 2067997]

Comment 5 errata-xmlrpc 2022-11-08 09:36:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7558

Comment 6 errata-xmlrpc 2022-11-15 10:24:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8139

Comment 7 Product Security DevOps Team 2022-12-06 23:33:09 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):