Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:2084: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.
Red Hat Security Data
#vulnerability#web#linux#red_hat#git#java#ibm#sap

Synopsis

Important: libwebp security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for libwebp is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.

Security Fix(es):

  • Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64

Fixes

  • BZ - 2186102 - CVE-2023-1999 Mozilla: libwebp: Double-free in libwebp

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

libwebp-1.0.0-7.el8_4.src.rpm

SHA-256: 381aa7b2f7280f34ecd6d17d6f62f40d089812092379d4a2e2728e382cfaaf11

x86_64

libwebp-1.0.0-7.el8_4.i686.rpm

SHA-256: 41d5c0bd12266364e6dbd3d60f7d1efa3b5aaea6e1d65f54d77a0d0994690c32

libwebp-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 3aeb3a949e2c78e60f2dcb0805dbe84416ea24032cc297eabe9936b48b58ab93

libwebp-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: fd125284de6aaa8d9f787af939b53cf2dcc3a73793043fdab37dadf2b59bde25

libwebp-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 722e5293bf0c8d9685b0eaf0f8e558abb59a8eeff3afaeb927a1a88a88d22c0d

libwebp-debugsource-1.0.0-7.el8_4.i686.rpm

SHA-256: d52d2ce2628415530aef4269e3337a723b64e054381f87327e3860fcfa07a1b8

libwebp-debugsource-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 3f4f213f116896fa48e6a0500bcdc81e03e4ff7fc719f67db98a34a6c858b511

libwebp-devel-1.0.0-7.el8_4.i686.rpm

SHA-256: 16f4a7f10bd75981aa5d0c8f597969f60941046aa2afbc9a215f2c909f73a620

libwebp-devel-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 6dfcec7d5867d36b8fa6e720546d09cdcda6bc6aca8e83e9cb4a8ab78b977c96

libwebp-java-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: 1057194a792fde0a295e64b6eb1d66547851228cb26cba1c0b9ef4cf441a17c6

libwebp-java-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 943cdcd46271359eb886d5193d6dc93e502ea3f4df77f341fb9e9248586ce681

libwebp-tools-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: c920b5c47c576839c15bb5d7992061d63d9e93e423ee2599df56a22c1f1bf02d

libwebp-tools-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: b8d88e5257331fae10f7ee82aa175fd5e9bccb03173bc98430d617414582fcc3

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

libwebp-1.0.0-7.el8_4.src.rpm

SHA-256: 381aa7b2f7280f34ecd6d17d6f62f40d089812092379d4a2e2728e382cfaaf11

x86_64

libwebp-1.0.0-7.el8_4.i686.rpm

SHA-256: 41d5c0bd12266364e6dbd3d60f7d1efa3b5aaea6e1d65f54d77a0d0994690c32

libwebp-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 3aeb3a949e2c78e60f2dcb0805dbe84416ea24032cc297eabe9936b48b58ab93

libwebp-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: fd125284de6aaa8d9f787af939b53cf2dcc3a73793043fdab37dadf2b59bde25

libwebp-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 722e5293bf0c8d9685b0eaf0f8e558abb59a8eeff3afaeb927a1a88a88d22c0d

libwebp-debugsource-1.0.0-7.el8_4.i686.rpm

SHA-256: d52d2ce2628415530aef4269e3337a723b64e054381f87327e3860fcfa07a1b8

libwebp-debugsource-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 3f4f213f116896fa48e6a0500bcdc81e03e4ff7fc719f67db98a34a6c858b511

libwebp-devel-1.0.0-7.el8_4.i686.rpm

SHA-256: 16f4a7f10bd75981aa5d0c8f597969f60941046aa2afbc9a215f2c909f73a620

libwebp-devel-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 6dfcec7d5867d36b8fa6e720546d09cdcda6bc6aca8e83e9cb4a8ab78b977c96

libwebp-java-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: 1057194a792fde0a295e64b6eb1d66547851228cb26cba1c0b9ef4cf441a17c6

libwebp-java-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 943cdcd46271359eb886d5193d6dc93e502ea3f4df77f341fb9e9248586ce681

libwebp-tools-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: c920b5c47c576839c15bb5d7992061d63d9e93e423ee2599df56a22c1f1bf02d

libwebp-tools-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: b8d88e5257331fae10f7ee82aa175fd5e9bccb03173bc98430d617414582fcc3

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

libwebp-1.0.0-7.el8_4.src.rpm

SHA-256: 381aa7b2f7280f34ecd6d17d6f62f40d089812092379d4a2e2728e382cfaaf11

s390x

libwebp-1.0.0-7.el8_4.s390x.rpm

SHA-256: 5740916e50051af705019e564321b3dd427c759875279aaf824cfa45f163ae5b

libwebp-debuginfo-1.0.0-7.el8_4.s390x.rpm

SHA-256: 479fd36a9b7bbb628b36c8878f45a852b6f4b8dce9acc46851eb4b5f8674f802

libwebp-debugsource-1.0.0-7.el8_4.s390x.rpm

SHA-256: a6fb3e61d8277cb8a04e36cd2a15489e7dd719001713a3e6b6a5efaf605f96c6

libwebp-devel-1.0.0-7.el8_4.s390x.rpm

SHA-256: fcd9ad385ef8c2655ef386586f29e395973a5c713653b29cb324de11462060a1

libwebp-java-debuginfo-1.0.0-7.el8_4.s390x.rpm

SHA-256: 4ff11d5f2cd028d63e49c3cd63aa3c563110ab85748ba0743c532cba523b522d

libwebp-tools-debuginfo-1.0.0-7.el8_4.s390x.rpm

SHA-256: ac67839b6ed279cb0b0c7db69fef349850b90d09a842e1dc246910b7e9c15a7f

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

libwebp-1.0.0-7.el8_4.src.rpm

SHA-256: 381aa7b2f7280f34ecd6d17d6f62f40d089812092379d4a2e2728e382cfaaf11

ppc64le

libwebp-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 4828f34785df8028f56b2726f679000a9c5e8ad8b3261cfc6517e3433b1a550d

libwebp-debuginfo-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 0fe7f5b78f6addc9fc708251e229a423eba8721e8b288457d13e9acd91a207aa

libwebp-debugsource-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 2449664cd08c1b6f0c5917a7b789304523b65b8261d8407b4be55c38b66fd453

libwebp-devel-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 42a44b75a8b098dc020dac51e441607f089e8d7a57d9fa074249edcb9e4368f6

libwebp-java-debuginfo-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: cc3cf6f06a3014693052ac384a203c4f18f539465e62b8ea846b946b1b3f7a03

libwebp-tools-debuginfo-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 7f040f89af10180d61457aac6024749d26e307dc39ab6f702fae455753226e3e

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

libwebp-1.0.0-7.el8_4.src.rpm

SHA-256: 381aa7b2f7280f34ecd6d17d6f62f40d089812092379d4a2e2728e382cfaaf11

x86_64

libwebp-1.0.0-7.el8_4.i686.rpm

SHA-256: 41d5c0bd12266364e6dbd3d60f7d1efa3b5aaea6e1d65f54d77a0d0994690c32

libwebp-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 3aeb3a949e2c78e60f2dcb0805dbe84416ea24032cc297eabe9936b48b58ab93

libwebp-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: fd125284de6aaa8d9f787af939b53cf2dcc3a73793043fdab37dadf2b59bde25

libwebp-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 722e5293bf0c8d9685b0eaf0f8e558abb59a8eeff3afaeb927a1a88a88d22c0d

libwebp-debugsource-1.0.0-7.el8_4.i686.rpm

SHA-256: d52d2ce2628415530aef4269e3337a723b64e054381f87327e3860fcfa07a1b8

libwebp-debugsource-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 3f4f213f116896fa48e6a0500bcdc81e03e4ff7fc719f67db98a34a6c858b511

libwebp-devel-1.0.0-7.el8_4.i686.rpm

SHA-256: 16f4a7f10bd75981aa5d0c8f597969f60941046aa2afbc9a215f2c909f73a620

libwebp-devel-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 6dfcec7d5867d36b8fa6e720546d09cdcda6bc6aca8e83e9cb4a8ab78b977c96

libwebp-java-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: 1057194a792fde0a295e64b6eb1d66547851228cb26cba1c0b9ef4cf441a17c6

libwebp-java-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 943cdcd46271359eb886d5193d6dc93e502ea3f4df77f341fb9e9248586ce681

libwebp-tools-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: c920b5c47c576839c15bb5d7992061d63d9e93e423ee2599df56a22c1f1bf02d

libwebp-tools-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: b8d88e5257331fae10f7ee82aa175fd5e9bccb03173bc98430d617414582fcc3

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

libwebp-1.0.0-7.el8_4.src.rpm

SHA-256: 381aa7b2f7280f34ecd6d17d6f62f40d089812092379d4a2e2728e382cfaaf11

aarch64

libwebp-1.0.0-7.el8_4.aarch64.rpm

SHA-256: d5ca87814fd59bfe0eeed45638705a86e7f1b601317719a20b2239db43b3ec08

libwebp-debuginfo-1.0.0-7.el8_4.aarch64.rpm

SHA-256: 666c405ba66eff51807c08e0e543314a3dc3ed5f0dd9e9fcdcedf60fc3e4a91a

libwebp-debugsource-1.0.0-7.el8_4.aarch64.rpm

SHA-256: 2867a1618e0c039c4824bc5b49492e152f230e137335b4dc45e49ef94896e059

libwebp-devel-1.0.0-7.el8_4.aarch64.rpm

SHA-256: 628dfc688d8f113fb82d356b1537385df0ecb56b565de964f722118e44c96c4d

libwebp-java-debuginfo-1.0.0-7.el8_4.aarch64.rpm

SHA-256: 8df67a446b79051b41052a66b440ee4ae0fd55f703152c42fec2b3829c811ec7

libwebp-tools-debuginfo-1.0.0-7.el8_4.aarch64.rpm

SHA-256: 613be33562bbb0d7b20024825bdfdcf19dee5063fb524ad32d5620ffb0c49886

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

libwebp-1.0.0-7.el8_4.src.rpm

SHA-256: 381aa7b2f7280f34ecd6d17d6f62f40d089812092379d4a2e2728e382cfaaf11

ppc64le

libwebp-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 4828f34785df8028f56b2726f679000a9c5e8ad8b3261cfc6517e3433b1a550d

libwebp-debuginfo-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 0fe7f5b78f6addc9fc708251e229a423eba8721e8b288457d13e9acd91a207aa

libwebp-debugsource-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 2449664cd08c1b6f0c5917a7b789304523b65b8261d8407b4be55c38b66fd453

libwebp-devel-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 42a44b75a8b098dc020dac51e441607f089e8d7a57d9fa074249edcb9e4368f6

libwebp-java-debuginfo-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: cc3cf6f06a3014693052ac384a203c4f18f539465e62b8ea846b946b1b3f7a03

libwebp-tools-debuginfo-1.0.0-7.el8_4.ppc64le.rpm

SHA-256: 7f040f89af10180d61457aac6024749d26e307dc39ab6f702fae455753226e3e

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

libwebp-1.0.0-7.el8_4.src.rpm

SHA-256: 381aa7b2f7280f34ecd6d17d6f62f40d089812092379d4a2e2728e382cfaaf11

x86_64

libwebp-1.0.0-7.el8_4.i686.rpm

SHA-256: 41d5c0bd12266364e6dbd3d60f7d1efa3b5aaea6e1d65f54d77a0d0994690c32

libwebp-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 3aeb3a949e2c78e60f2dcb0805dbe84416ea24032cc297eabe9936b48b58ab93

libwebp-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: fd125284de6aaa8d9f787af939b53cf2dcc3a73793043fdab37dadf2b59bde25

libwebp-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 722e5293bf0c8d9685b0eaf0f8e558abb59a8eeff3afaeb927a1a88a88d22c0d

libwebp-debugsource-1.0.0-7.el8_4.i686.rpm

SHA-256: d52d2ce2628415530aef4269e3337a723b64e054381f87327e3860fcfa07a1b8

libwebp-debugsource-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 3f4f213f116896fa48e6a0500bcdc81e03e4ff7fc719f67db98a34a6c858b511

libwebp-devel-1.0.0-7.el8_4.i686.rpm

SHA-256: 16f4a7f10bd75981aa5d0c8f597969f60941046aa2afbc9a215f2c909f73a620

libwebp-devel-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 6dfcec7d5867d36b8fa6e720546d09cdcda6bc6aca8e83e9cb4a8ab78b977c96

libwebp-java-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: 1057194a792fde0a295e64b6eb1d66547851228cb26cba1c0b9ef4cf441a17c6

libwebp-java-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: 943cdcd46271359eb886d5193d6dc93e502ea3f4df77f341fb9e9248586ce681

libwebp-tools-debuginfo-1.0.0-7.el8_4.i686.rpm

SHA-256: c920b5c47c576839c15bb5d7992061d63d9e93e423ee2599df56a22c1f1bf02d

libwebp-tools-debuginfo-1.0.0-7.el8_4.x86_64.rpm

SHA-256: b8d88e5257331fae10f7ee82aa175fd5e9bccb03173bc98430d617414582fcc3

Related news

CVE-2023-45085: Releases - HyperCloud Docs

An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process.  In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window. This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.

Red Hat Security Advisory 2023-3624-01

Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3356-01

Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

CVE-2023-29551: Security Vulnerabilities fixed in Firefox 112, Firefox for Android 112, Focus for Android 112

Mozilla developers Randell Jesup, Andrew McCreight, Gabriele Svelto, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 111. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.

CVE-2023-29550: Security Vulnerabilities fixed in Firefox ESR 102.10

Mozilla developers Randell Jesup, Andrew Osmond, Sebastian Hengst, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

Red Hat Security Advisory 2023-3326-01

Red Hat Security Advisory 2023-3326-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.6 images. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

Ubuntu Security Notice USN-6078-1

Ubuntu Security Notice 6078-1 - Irvan Kurniawan discovered that libwebp incorrectly handled certain memory operations. If a user or automated system were tricked into opening a specially crafted image file, a remote attacker could use this issue to cause libwebp to crash, resulting in a denial of service, or possibly execute arbitrary code.

RHSA-2023:2110: Red Hat Security Advisory: OpenShift Container Platform 4.12.16 security update

Red Hat OpenShift Container Platform release 4.12.16 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-46146: A flaw was found in exporter-toolkit. A request can be forged by an attacker to poison the internal cache used to cache hashes and make subsequent successful requests. This cache is ...

Red Hat Security Advisory 2023-2085-01

Red Hat Security Advisory 2023-2085-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

Red Hat Security Advisory 2023-2072-01

Red Hat Security Advisory 2023-2072-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

Red Hat Security Advisory 2023-2077-01

Red Hat Security Advisory 2023-2077-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

Red Hat Security Advisory 2023-2073-01

Red Hat Security Advisory 2023-2073-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

Red Hat Security Advisory 2023-2078-01

Red Hat Security Advisory 2023-2078-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

Red Hat Security Advisory 2023-2075-01

Red Hat Security Advisory 2023-2075-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

RHSA-2023:2085: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2077: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2076: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2075: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2073: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.