wavpack is vulnerable to arbitrary code execution. A stack-based buffer over-read in the ParseRiffHeaderConfig
function of cli/riff.c
allows a remote attacker to execute arbitrary code on the system via a malicious RF64 file.
packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
bugs.debian.org/cgi-bin/bugreport.cgi?bug=889276
github.com/dbry/WavPack/commit/d5bf76b5a88d044a1be1d5656698e3ba737167e5
github.com/dbry/WavPack/issues/27
seclists.org/bugtraq/2019/Dec/37
usn.ubuntu.com/3568-1/
www.debian.org/security/2018/dsa-4125