Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.853673
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for wavpack (openSUSE-SU-2021:0153-1)
Summary:The remote host is missing an update for the 'wavpack'; package(s) announced via the openSUSE-SU-2021:0153-1 advisory.
Description:Summary:
The remote host is missing an update for the 'wavpack'
package(s) announced via the openSUSE-SU-2021:0153-1 advisory.

Vulnerability Insight:
This update for wavpack fixes the following issues:

- Update to version 5.4.0

* CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples
(bsc#1180414)

* fixed: disable A32 asm code when building for Apple silicon

* fixed: issues with Adobe-style floating-point WAV files

* added: --normalize-floats option to wvunpack for correctly exporting
un-normalized floating-point files

- Update to version 5.3.0

* fixed: OSS-Fuzz issues 19925, 19928, 20060, 20448

* fixed: trailing garbage characters on imported ID3v2 TXXX tags

* fixed: various minor undefined behavior and memory access issues

* fixed: sanitize tag extraction names for length and path inclusion

* improved: reformat wvunpack 'help' and split into long + short versions

* added: regression testing to Travis CI for OSS-Fuzz crashes

- Updated to version 5.2.0
*fixed: potential security issues including the following CVEs:
CVE-2018-19840, CVE-2018-19841, CVE-2018-10536 (bsc#1091344),
CVE-2018-10537 (bsc#1091343) CVE-2018-10538 (bsc#1091342),
CVE-2018-10539 (bsc#1091341), CVE-2018-10540 (bsc#1091340),
CVE-2018-7254, CVE-2018-7253, CVE-2018-6767, CVE-2019-11498 and
CVE-2019-1010319

* added: support for CMake, Travis CI, and Google' s OSS-fuzz

* fixed: use correction file for encode verify (pipe input, Windows)

* fixed: correct WAV header with actual length (pipe input, -i option)

* fixed: thumb interworking and not needing v6 architecture (ARM asm)

* added: handle more ID3v2.3 tag items and from all file types

* fixed: coredump on Sparc64 (changed MD5 implementation)

* fixed: handle invalid ID3v2.3 tags from sacd-ripper

* fixed: several corner-case memory leaks

This update was imported from the SUSE:SLE-15:Update update project.

Affected Software/OS:
'wavpack' package(s) on openSUSE Leap 15.2.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-10536
Bugtraq: 20191219 [slackware-security] wavpack (SSA:2019-353-01) (Google Search)
https://seclists.org/bugtraq/2019/Dec/37
Debian Security Information: DSA-4197 (Google Search)
https://www.debian.org/security/2018/dsa-4197
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRWQNE3TH5UF64IKHKKHVCHJHUOVKJUH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CFFFWIWALGQPKINRDW3PRGRD5LOLGZA/
http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
https://github.com/dbry/WavPack/issues/30
https://github.com/dbry/WavPack/issues/31
https://github.com/dbry/WavPack/issues/32
https://usn.ubuntu.com/3637-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-10537
Common Vulnerability Exposure (CVE) ID: CVE-2018-10538
https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
https://github.com/dbry/WavPack/issues/33
Common Vulnerability Exposure (CVE) ID: CVE-2018-10539
Common Vulnerability Exposure (CVE) ID: CVE-2018-10540
Common Vulnerability Exposure (CVE) ID: CVE-2018-19840
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZGXJUHCGQI6XKLCBUZHXPYIIWMFWA22/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVVKOBJR5APOB3KWUWJ4UWQHUBZQL6C6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3BLSOEVEKF4VNNVNZ2AN46BJUT4TGVWT/
https://security.gentoo.org/glsa/202007-19
https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51
https://github.com/dbry/WavPack/issues/53
https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html
SuSE Security Announcement: openSUSE-SU-2019:1145 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00029.html
https://usn.ubuntu.com/3839-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-19841
https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b
https://github.com/dbry/WavPack/issues/54
Common Vulnerability Exposure (CVE) ID: CVE-2018-6767
Debian Security Information: DSA-4125 (Google Search)
https://www.debian.org/security/2018/dsa-4125
https://usn.ubuntu.com/3568-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-7253
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889559
https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec
https://github.com/dbry/WavPack/issues/28
https://usn.ubuntu.com/3578-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-7254
https://www.exploit-db.com/exploits/44154/
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889274
https://github.com/dbry/WavPack/commit/8e3fe45a7bac31d9a3b558ae0079e2d92a04799e
https://github.com/dbry/WavPack/issues/26
Common Vulnerability Exposure (CVE) ID: CVE-2019-1010319
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IX3J2JML5A7KC2BLGBEFTIIZR3EM7LVJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYESOAZ6Z6IG4BQBURL6OUY6P4YB6SKS/
https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe
https://github.com/dbry/WavPack/issues/68
https://usn.ubuntu.com/4062-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-11498
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZDKXGA2ZNSSM64ZYDHOWCO4Q4VAKAON/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SCK2YJXY6V5CKGKSF2PPN7RL2DXVOC6G/
https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4
https://github.com/dbry/WavPack/issues/67
https://usn.ubuntu.com/3960-1/
Common Vulnerability Exposure (CVE) ID: CVE-2020-35738
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/76B7K6F74FDQATG7FECXR5KPIG52O2VL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2YZLKYE66EU4XRHTABV5LB2G7ZDZ422F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDFY4NGGDUTLVID5PNVU7LL2G2ZJLZFY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PENN4ZXRPZULEJOYTTLUZMBZ5H46QTUC/
https://github.com/dbry/WavPack/issues/91
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.