You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Recently, there was a serious buffer overflow vulnerability in libwebp, which is said to have been resolved in version 1.3.2.
I wonder if this package is safe from vulnerabilities.
If it contains a vulnerable version of libwebp, could you please provide a resolved version of the package?
Thank you for always.
Thanks for bringing this to my attention. The internal libwebp is a minimal build that only has the functions used for encoding/decoding image data, so it was probably vulnerable. I've updated to the latest commit, rebuilt, and have pushed as a new version 3.1.9.
Recently, there was a serious buffer overflow vulnerability in libwebp, which is said to have been resolved in version 1.3.2.
I wonder if this package is safe from vulnerabilities.
If it contains a vulnerable version of libwebp, could you please provide a resolved version of the package?
Thank you for always.
Related Links
https://nvd.nist.gov/vuln/detail/CVE-2023-4863
https://nvd.nist.gov/vuln/detail/CVE-2023-41064
lovell/sharp#3798
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
The text was updated successfully, but these errors were encountered: