openSUSE Security Update: Security update for wavpack

Announcement ID:    openSUSE-SU-2021:0153-1
Rating:             moderate
References:         #1091340 #1091341 #1091342 #1091343 #1091344 
Cross-References:   CVE-2018-10536 CVE-2018-10537 CVE-2018-10538
                    CVE-2018-10539 CVE-2018-10540 CVE-2018-19840
                    CVE-2018-19841 CVE-2018-6767 CVE-2018-7253
                    CVE-2018-7254 CVE-2019-1010319 CVE-2019-11498
Affected Products:
                    openSUSE Leap 15.2

   An update that fixes 13 vulnerabilities is now available.


   This update for wavpack fixes the following issues:

   - Update to version 5.4.0
     * CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples
     * fixed: disable A32 asm code when building for Apple silicon
     * fixed: issues with Adobe-style floating-point WAV files
     * added: --normalize-floats option to wvunpack for correctly exporting
       un-normalized floating-point files
   - Update to version 5.3.0
     * fixed: OSS-Fuzz issues 19925, 19928, 20060, 20448
     * fixed: trailing garbage characters on imported ID3v2 TXXX tags
     * fixed: various minor undefined behavior and memory access issues
     * fixed: sanitize tag extraction names for length and path inclusion
     * improved: reformat wvunpack "help" and split into long + short versions
     * added: regression testing to Travis CI for OSS-Fuzz crashers
   - Updated to version 5.2.0
     *fixed: potential security issues including the following CVEs:
      CVE-2018-19840, CVE-2018-19841, CVE-2018-10536 (bsc#1091344),
      CVE-2018-10537 (bsc#1091343) CVE-2018-10538 (bsc#1091342),
      CVE-2018-10539 (bsc#1091341), CVE-2018-10540 (bsc#1091340),
      CVE-2018-7254,  CVE-2018-7253, CVE-2018-6767, CVE-2019-11498 and
     * added: support for CMake, Travis CI, and Google's OSS-fuzz
     * fixed: use correction file for encode verify (pipe input, Windows)
     * fixed: correct WAV header with actual length (pipe input, -i option)
     * fixed: thumb interworking and not needing v6 architecture (ARM asm)
     * added: handle more ID3v2.3 tag items and from all file types
     * fixed: coredump on Sparc64 (changed MD5 implementation)
     * fixed: handle invalid ID3v2.3 tags from sacd-ripper
     * fixed: several corner-case memory leaks

   This update was imported from the SUSE:SLE-15:Update update project.

Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.2:

      zypper in -t patch openSUSE-2021-153=1

Package List:

   - openSUSE Leap 15.2 (i586 x86_64):


   - openSUSE Leap 15.2 (x86_64):