Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:2085: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.
Red Hat Security Data
#vulnerability#web#linux#red_hat#git#java#ibm#sap

Synopsis

Important: libwebp security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for libwebp is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently.

Security Fix(es):

  • Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2186102 - CVE-2023-1999 Mozilla: libwebp: Double-free in libwebp

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

libwebp-1.0.0-7.el8_6.src.rpm

SHA-256: ef4824be5c16b7c9501dd70d28c92ed3a16094f8378eadaa210c5df94181e3ed

x86_64

libwebp-1.0.0-7.el8_6.i686.rpm

SHA-256: 9be01a2fd8dda089ad4c4195484b0bc91c59de48ea7033a3de1853442787b53e

libwebp-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 64c2fa68756f20485b28c44bdd3a18ffb49a23b8e3dcdd0dd9bdbebc08261181

libwebp-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: 2477775c7f9e426b67a0af7917eac87999539e40190c0b4c0862c8a089ae21e9

libwebp-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 6d83fe33a287fc442fe1dda47f69c4539331f48806c2b818c88fd9c3bec83aaf

libwebp-debugsource-1.0.0-7.el8_6.i686.rpm

SHA-256: 1d85b8125d2e722e292bceb875eff076082c483da1d39bff8b4cfb1ef3fa97ff

libwebp-debugsource-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 13c6580ff91fe707e6cb90b75c2f5e9372b3e125e635c52abacc54aa2b642cdf

libwebp-devel-1.0.0-7.el8_6.i686.rpm

SHA-256: 4f06f46ccce5c4c84eeb4111b60bc60ec730ffc02c8d440f9be1903e1d1070d4

libwebp-devel-1.0.0-7.el8_6.x86_64.rpm

SHA-256: a3375d6c0760e85f42a3acaaee9f1b2473aafc7ee2b9aba5a9300f80ffed81c1

libwebp-java-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: 9e1b61f60bcc86af1fed3661676f393d9838ebc952d7695413e46bcc65a7c6e4

libwebp-java-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: ef4dba32aaa7a0aeb50dc73c5d4d589a53a1d5ff65dddac9da60884c461cdc89

libwebp-tools-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: ecc7a1e60da0277f596b9634ed6ebd65ab341fbaf3f875d0e215ac1a08b1d4a6

libwebp-tools-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 27afbf6737be21284dae53181080d96cd9bba51e18edc3247d3384454b042c3b

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

libwebp-1.0.0-7.el8_6.src.rpm

SHA-256: ef4824be5c16b7c9501dd70d28c92ed3a16094f8378eadaa210c5df94181e3ed

x86_64

libwebp-1.0.0-7.el8_6.i686.rpm

SHA-256: 9be01a2fd8dda089ad4c4195484b0bc91c59de48ea7033a3de1853442787b53e

libwebp-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 64c2fa68756f20485b28c44bdd3a18ffb49a23b8e3dcdd0dd9bdbebc08261181

libwebp-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: 2477775c7f9e426b67a0af7917eac87999539e40190c0b4c0862c8a089ae21e9

libwebp-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 6d83fe33a287fc442fe1dda47f69c4539331f48806c2b818c88fd9c3bec83aaf

libwebp-debugsource-1.0.0-7.el8_6.i686.rpm

SHA-256: 1d85b8125d2e722e292bceb875eff076082c483da1d39bff8b4cfb1ef3fa97ff

libwebp-debugsource-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 13c6580ff91fe707e6cb90b75c2f5e9372b3e125e635c52abacc54aa2b642cdf

libwebp-devel-1.0.0-7.el8_6.i686.rpm

SHA-256: 4f06f46ccce5c4c84eeb4111b60bc60ec730ffc02c8d440f9be1903e1d1070d4

libwebp-devel-1.0.0-7.el8_6.x86_64.rpm

SHA-256: a3375d6c0760e85f42a3acaaee9f1b2473aafc7ee2b9aba5a9300f80ffed81c1

libwebp-java-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: 9e1b61f60bcc86af1fed3661676f393d9838ebc952d7695413e46bcc65a7c6e4

libwebp-java-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: ef4dba32aaa7a0aeb50dc73c5d4d589a53a1d5ff65dddac9da60884c461cdc89

libwebp-tools-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: ecc7a1e60da0277f596b9634ed6ebd65ab341fbaf3f875d0e215ac1a08b1d4a6

libwebp-tools-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 27afbf6737be21284dae53181080d96cd9bba51e18edc3247d3384454b042c3b

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

libwebp-1.0.0-7.el8_6.src.rpm

SHA-256: ef4824be5c16b7c9501dd70d28c92ed3a16094f8378eadaa210c5df94181e3ed

s390x

libwebp-1.0.0-7.el8_6.s390x.rpm

SHA-256: ef6361286457e824603b77fd9d8bc725d8318e2bd5418557594b163fd3458fd7

libwebp-debuginfo-1.0.0-7.el8_6.s390x.rpm

SHA-256: 1cff10bbc5aee9e4a7a085cf97dc03a657b6448306ad6286309014e3299178c8

libwebp-debugsource-1.0.0-7.el8_6.s390x.rpm

SHA-256: a97352216327d6f4e9f97c8a08562ed7c0ffd48bdf96f05980e5e760c004607d

libwebp-devel-1.0.0-7.el8_6.s390x.rpm

SHA-256: 7363b3be8298e16f2196712401e6b37bccafd9bbbed899f97415fa47f97a3968

libwebp-java-debuginfo-1.0.0-7.el8_6.s390x.rpm

SHA-256: b55da2da4b03559bc66a18160ff73c94bbe0492a3131cd60b7d0486cb083b6da

libwebp-tools-debuginfo-1.0.0-7.el8_6.s390x.rpm

SHA-256: 05c621d524f34a1a9753d587ea616ee189cbcc10b18b9d48d7de50f55cb52556

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

libwebp-1.0.0-7.el8_6.src.rpm

SHA-256: ef4824be5c16b7c9501dd70d28c92ed3a16094f8378eadaa210c5df94181e3ed

ppc64le

libwebp-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: ac1f78b00e80288dc0df3a9eef34e8018d157acf0e28dec35d245fb2dacbb07e

libwebp-debuginfo-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: dafa4aae41d5bf332968ed2cf1c45b9b53f809862595a6d2bd160a7904927e0d

libwebp-debugsource-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: 6722440224a7551687253a89b65067f490806fed31bc355f177d8d269a40c737

libwebp-devel-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: fc9df5db9c6aab2c71a487741b1378b3e4ed6c5fcb2f52cef7b69157259cd61c

libwebp-java-debuginfo-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: 9ce33c297633e9af92a54273560e88f2f32256c84807d8361d14e521d16dd9e3

libwebp-tools-debuginfo-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: e35e5698592a16aa46d6032e601da1c2319d35b6b448aa9f20e6ef010c8e400a

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

libwebp-1.0.0-7.el8_6.src.rpm

SHA-256: ef4824be5c16b7c9501dd70d28c92ed3a16094f8378eadaa210c5df94181e3ed

x86_64

libwebp-1.0.0-7.el8_6.i686.rpm

SHA-256: 9be01a2fd8dda089ad4c4195484b0bc91c59de48ea7033a3de1853442787b53e

libwebp-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 64c2fa68756f20485b28c44bdd3a18ffb49a23b8e3dcdd0dd9bdbebc08261181

libwebp-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: 2477775c7f9e426b67a0af7917eac87999539e40190c0b4c0862c8a089ae21e9

libwebp-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 6d83fe33a287fc442fe1dda47f69c4539331f48806c2b818c88fd9c3bec83aaf

libwebp-debugsource-1.0.0-7.el8_6.i686.rpm

SHA-256: 1d85b8125d2e722e292bceb875eff076082c483da1d39bff8b4cfb1ef3fa97ff

libwebp-debugsource-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 13c6580ff91fe707e6cb90b75c2f5e9372b3e125e635c52abacc54aa2b642cdf

libwebp-devel-1.0.0-7.el8_6.i686.rpm

SHA-256: 4f06f46ccce5c4c84eeb4111b60bc60ec730ffc02c8d440f9be1903e1d1070d4

libwebp-devel-1.0.0-7.el8_6.x86_64.rpm

SHA-256: a3375d6c0760e85f42a3acaaee9f1b2473aafc7ee2b9aba5a9300f80ffed81c1

libwebp-java-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: 9e1b61f60bcc86af1fed3661676f393d9838ebc952d7695413e46bcc65a7c6e4

libwebp-java-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: ef4dba32aaa7a0aeb50dc73c5d4d589a53a1d5ff65dddac9da60884c461cdc89

libwebp-tools-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: ecc7a1e60da0277f596b9634ed6ebd65ab341fbaf3f875d0e215ac1a08b1d4a6

libwebp-tools-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 27afbf6737be21284dae53181080d96cd9bba51e18edc3247d3384454b042c3b

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

libwebp-1.0.0-7.el8_6.src.rpm

SHA-256: ef4824be5c16b7c9501dd70d28c92ed3a16094f8378eadaa210c5df94181e3ed

aarch64

libwebp-1.0.0-7.el8_6.aarch64.rpm

SHA-256: ca9968d1344efd4794db32d1ab5199630c3067703683b64886f993afaa77dbe6

libwebp-debuginfo-1.0.0-7.el8_6.aarch64.rpm

SHA-256: 6031e93868267ebc1890ca0a41ae63409038af7560057954a3a04af2c6c30ba1

libwebp-debugsource-1.0.0-7.el8_6.aarch64.rpm

SHA-256: 440f3acb2d3c1f911312fc062ed5e2f50e025775421770ebff3c136462a344fd

libwebp-devel-1.0.0-7.el8_6.aarch64.rpm

SHA-256: 8270b8b7abe5df02a7dd2f8c007904708aa6f6490e7c7423a1a03c85963acfc4

libwebp-java-debuginfo-1.0.0-7.el8_6.aarch64.rpm

SHA-256: 56173ec4692d63402717f86dc14a65503c0e865050416bfd8cefc6b72ca74c90

libwebp-tools-debuginfo-1.0.0-7.el8_6.aarch64.rpm

SHA-256: 6d3ebea029940946b4c9ce6badcd08bcc265ceab4106bbd94bd0ec660367e7e2

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

libwebp-1.0.0-7.el8_6.src.rpm

SHA-256: ef4824be5c16b7c9501dd70d28c92ed3a16094f8378eadaa210c5df94181e3ed

ppc64le

libwebp-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: ac1f78b00e80288dc0df3a9eef34e8018d157acf0e28dec35d245fb2dacbb07e

libwebp-debuginfo-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: dafa4aae41d5bf332968ed2cf1c45b9b53f809862595a6d2bd160a7904927e0d

libwebp-debugsource-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: 6722440224a7551687253a89b65067f490806fed31bc355f177d8d269a40c737

libwebp-devel-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: fc9df5db9c6aab2c71a487741b1378b3e4ed6c5fcb2f52cef7b69157259cd61c

libwebp-java-debuginfo-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: 9ce33c297633e9af92a54273560e88f2f32256c84807d8361d14e521d16dd9e3

libwebp-tools-debuginfo-1.0.0-7.el8_6.ppc64le.rpm

SHA-256: e35e5698592a16aa46d6032e601da1c2319d35b6b448aa9f20e6ef010c8e400a

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

libwebp-1.0.0-7.el8_6.src.rpm

SHA-256: ef4824be5c16b7c9501dd70d28c92ed3a16094f8378eadaa210c5df94181e3ed

x86_64

libwebp-1.0.0-7.el8_6.i686.rpm

SHA-256: 9be01a2fd8dda089ad4c4195484b0bc91c59de48ea7033a3de1853442787b53e

libwebp-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 64c2fa68756f20485b28c44bdd3a18ffb49a23b8e3dcdd0dd9bdbebc08261181

libwebp-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: 2477775c7f9e426b67a0af7917eac87999539e40190c0b4c0862c8a089ae21e9

libwebp-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 6d83fe33a287fc442fe1dda47f69c4539331f48806c2b818c88fd9c3bec83aaf

libwebp-debugsource-1.0.0-7.el8_6.i686.rpm

SHA-256: 1d85b8125d2e722e292bceb875eff076082c483da1d39bff8b4cfb1ef3fa97ff

libwebp-debugsource-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 13c6580ff91fe707e6cb90b75c2f5e9372b3e125e635c52abacc54aa2b642cdf

libwebp-devel-1.0.0-7.el8_6.i686.rpm

SHA-256: 4f06f46ccce5c4c84eeb4111b60bc60ec730ffc02c8d440f9be1903e1d1070d4

libwebp-devel-1.0.0-7.el8_6.x86_64.rpm

SHA-256: a3375d6c0760e85f42a3acaaee9f1b2473aafc7ee2b9aba5a9300f80ffed81c1

libwebp-java-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: 9e1b61f60bcc86af1fed3661676f393d9838ebc952d7695413e46bcc65a7c6e4

libwebp-java-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: ef4dba32aaa7a0aeb50dc73c5d4d589a53a1d5ff65dddac9da60884c461cdc89

libwebp-tools-debuginfo-1.0.0-7.el8_6.i686.rpm

SHA-256: ecc7a1e60da0277f596b9634ed6ebd65ab341fbaf3f875d0e215ac1a08b1d4a6

libwebp-tools-debuginfo-1.0.0-7.el8_6.x86_64.rpm

SHA-256: 27afbf6737be21284dae53181080d96cd9bba51e18edc3247d3384454b042c3b

Related news

CVE-2023-45085: Releases - HyperCloud Docs

An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process.  In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window. This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.

Red Hat Security Advisory 2023-3624-01

Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3356-01

Red Hat Security Advisory 2023-3356-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

CVE-2023-29550: Security Vulnerabilities fixed in Firefox ESR 102.10

Mozilla developers Randell Jesup, Andrew Osmond, Sebastian Hengst, Andrew McCreight, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.

Gentoo Linux Security Advisory 202305-35

Gentoo Linux Security Advisory 202305-35 - Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. Versions greater than or equal to 102.10.0:esr are affected.

Debian Security Advisory 5408-1

Debian Linux Security Advisory 5408-1 - Irvan Kurniawan discovered a double free in the libwebp image compression library which may result in denial of service.

Ubuntu Security Notice USN-6078-1

Ubuntu Security Notice 6078-1 - Irvan Kurniawan discovered that libwebp incorrectly handled certain memory operations. If a user or automated system were tricked into opening a specially crafted image file, a remote attacker could use this issue to cause libwebp to crash, resulting in a denial of service, or possibly execute arbitrary code.

RHSA-2023:2110: Red Hat Security Advisory: OpenShift Container Platform 4.12.16 security update

Red Hat OpenShift Container Platform release 4.12.16 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-46146: A flaw was found in exporter-toolkit. A request can be forged by an attacker to poison the internal cache used to cache hashes and make subsequent successful requests. This cache is ...

Red Hat Security Advisory 2023-2085-01

Red Hat Security Advisory 2023-2085-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

Red Hat Security Advisory 2023-2076-01

Red Hat Security Advisory 2023-2076-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

Red Hat Security Advisory 2023-2072-01

Red Hat Security Advisory 2023-2072-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

Red Hat Security Advisory 2023-2073-01

Red Hat Security Advisory 2023-2073-01 - The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format. Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. Issues addressed include a double free vulnerability.

RHSA-2023:2084: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2078: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2077: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2076: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2075: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2073: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

RHSA-2023:2072: Red Hat Security Advisory: libwebp security update

An update for libwebp is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1999: The Mozilla Foundation Security Advisory describes this flaw as: A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.

Apple, Google, and Microsoft Just Fixed Zero-Day Security Flaws

Firefox gets a needed tune-up, SolarWinds squashes two high-severity bugs, Oracle patches 433 vulnerabilities, and more updates you should make now.