You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa WebP

Sigurnosni nedostatak programskog paketa WebP

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201701-61
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: WebP: Multiple vulnerabilities
Date: January 24, 2017
Bugs: #598208
ID: 201701-61

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

Multiple vulnerabilities have been discovered in WebP, the worst of
which could allow a remote attacker to cause a Denial of Service
condition.

Background
==========

WebP is an image format employing both lossy and lossless compression.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 media-libs/libwebp < 0.5.2 >= 0.5.2

Description
===========

Multiple vulnerabilities have been discovered in WebP’s gif2webp tool.
Please review the CVE identifier and bug reference for details.

Impact
======

A remote attacker, by enticing a user to process a specially crafted
file using WebP’s gif2webp tool, could possibly cause a Denial of
Service condition or other unspecified impacts.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All WebP users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=media-libs/libwebp-0.5.2”

References
==========

[ 1 ] CVE-2016-9085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9085

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201701-61

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=5+0s
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa LibRaw

Otkriveni su sigurnosni nedostaci u programskom paketu LibRaw za operacijski sustav Gentoo. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close