-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0195
                          wavpack security update
                              18 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wavpack
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-35738 CVE-2019-1010319 CVE-2019-1010317
                   CVE-2019-1010315 CVE-2019-11498 CVE-2018-19841
                   CVE-2018-19840  

Reference:         ESB-2021.0062
                   ESB-2020.1522

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2021/01/msg00013.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2525-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
January 15, 2021                            https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : wavpack
Version        : 5.0.0-2+deb9u3
CVE ID         : CVE-2018-19840 CVE-2018-19841 CVE-2019-11498
                 CVE-2019-1010315 CVE-2019-1010317
                 CVE-2019-1010319 CVE-2020-35738
Debian Bug     : 915564 915565 932060 932061 927903 978548

Multiple vulnerabilites in wavpack were found, like OOB read
(which could potentially lead to a DOS attack), unexpected
control flow, crashes, integer overflow, and segfaults.

For Debian 9 stretch, these problems have been fixed in version
5.0.0-2+deb9u3.

We recommend that you upgrade your wavpack packages.

For the detailed security status of wavpack please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wavpack

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmABaXsACgkQgj6WdgbD
S5aJrg/+IN3Qo681oqQ8UhGMoY7sORVnwsIrTFj9PkMPsOPCQY5FOPHPPGDYJAvT
k9YkskGwtwnTn1wjnSrzpFEh74rOaWmEvdLoy7U4Cyqgqip0MeBw0PfTUAtytLis
JIbcUhHvLHZwTQYG8BLwFuud9IjaX2a5xeVc+O5dGn5mOI4XOc9IO4h5uGOrkfod
2X5rhH5ft+D5kMNcJaboxvnNe+lAEi/ea779uXuB6va1UEmEtQUbi8LuaIopCt9c
Mte4/nLPVxCL9fwsdoaP6Le1BDois6AL1JzAdw8/btJibJUmQ6Ji1z6z6x47afNX
mudxqCPs7F911EPGB9XFVMry30OqucghxJzqIO3MUiTnnPI8NUXBbUJcW98L+AKi
4OVaC2BoZKpAEOSaOJeLLBBkz0fU0yJfeE4vP51Kad4JdIG5+8K4xvsm++Yf+Kdo
aSgYLeAwaPBCs2SOOwzWM5RI0BNwf0STmYJw14UJq76eBZYgdQw0CuUnq9dU21xm
3uesY3RiUnbOhb8z18EdDzMGZjgM7rIdROwWPbvD1UvAefbViCLEzVPvVBGtbKsU
/9cA7IyTOjaXywxvJW59ONCah1IodaEGtqEonA5yjbe/z4vtihSRjJLd71LWilYN
2V1NH7ow/Z4NJdra/9xIqj9+BgdmD00pGqN3WL5OPTHcwnBiOeY=
=7FNQ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=lbrY
-----END PGP SIGNATURE-----