– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201701-61
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Severity: Normal
Title: WebP: Multiple vulnerabilities
Date: January 24, 2017
Bugs: #598208
ID: 201701-61
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Synopsis
========
Multiple vulnerabilities have been discovered in WebP, the worst of
which could allow a remote attacker to cause a Denial of Service
condition.
Background
==========
WebP is an image format employing both lossy and lossless compression.
Affected packages
=================
——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 media-libs/libwebp < 0.5.2 >= 0.5.2
Description
===========
Multiple vulnerabilities have been discovered in WebP’s gif2webp tool.
Please review the CVE identifier and bug reference for details.
Impact
======
A remote attacker, by enticing a user to process a specially crafted
file using WebP’s gif2webp tool, could possibly cause a Denial of
Service condition or other unspecified impacts.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All WebP users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=media-libs/libwebp-0.5.2”
References
==========
[ 1 ] CVE-2016-9085
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9085
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201701-61
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=5+0s
—–END PGP SIGNATURE—–