USN-3637-1

Source
https://ubuntu.com/security/notices/USN-3637-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3637-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-3637-1
Related
Published
2018-04-30T20:09:25.231426Z
Modified
2018-04-30T20:09:25.231426Z
Summary
wavpack vulnerabilities
Details

Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu discovered that WavPack incorrectly handled certain .wav files. An attacker could possibly use this to execute arbitrary code or cause a denial of service. (CVE-2018-10536, CVE-2018-10537)

Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu discovered that WavPack incorrectly handled certain .wav files. An attacker could possibly use this to cause a denial of service. (CVE-2018-10538, CVE-2018-10539, CVE-2018-10540)

References

Affected packages

Ubuntu:18.04:LTS / wavpack

Package

Name
wavpack
Purl
pkg:deb/ubuntu/wavpack?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.0-2ubuntu1.1

Affected versions

5.*

5.1.0-2
5.1.0-2ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.1.0-2ubuntu1.1",
            "binary_name": "libwavpack-dev"
        },
        {
            "binary_version": "5.1.0-2ubuntu1.1",
            "binary_name": "libwavpack1"
        },
        {
            "binary_version": "5.1.0-2ubuntu1.1",
            "binary_name": "libwavpack1-dbgsym"
        },
        {
            "binary_version": "5.1.0-2ubuntu1.1",
            "binary_name": "wavpack"
        },
        {
            "binary_version": "5.1.0-2ubuntu1.1",
            "binary_name": "wavpack-dbgsym"
        }
    ]
}