Fedora has issued an advisory on November 3: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/PTR2ZW67TMT7KC24RBENIF25KWUJ7VPD/ The issue was fixed upstream in Chromium in this commit: https://chromium.googlesource.com/webm/libwebp/+/e2affacc35f1df6cc3b1a9fa0ceff5ce2d0cce83
Whiteboard: (none) => MGA5TOO
Assigning to all packagers collectively, since there is no registered maintainer for this package.
CC: (none) => alexander, marja11, olav, thierry.vignaudAssignee: bugsquad => pkg-bugs
Done for Cauldron. Regarding Mga5, the file "examples/gifdec.c" does not exist in version 0.4.3 so the patch does not apply. Is Mga5 really affected? I found that Debian considers that version 0.4.1 is also affected but I do not know why (as you can see here: https://security-tracker.debian.org/tracker/CVE-2016-9085).
CC: (none) => nicolas.salguero
Some of the code might be in examples/gif2webp_util.c, but it doesn't look like we have an issue in the mga5 library, so I'll close this until and unless more information becomes available. Thanks!
Status: NEW => RESOLVEDResolution: (none) => FIXEDWhiteboard: MGA5TOO => (none)
This is referenced in this Debian bug: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842714 libwebp 0.5.2 has been released, fixing CVE-2016-9085 as well as CVE-2016-8888: https://chromium.googlesource.com/webm/libwebp/+/master/NEWS Looking at the patch Debian added for this (0009-Import-use-relative-pointer-offsets.patch), it looks like it almost applies in src/enc/picture_csp.c, but the code in the second hunk has changed a bit.
Status: RESOLVED => REOPENEDVersion: Cauldron => 5Resolution: FIXED => (none)Summary: libwebp new security issue CVE-2016-9085 => libwebp new security issues CVE-2016-8888 and CVE-2016-9085Source RPM: libwebp-0.5.1-2.mga6.src.rpm => libwebp-0.4.3-1.mga5.src.rpm
Assignee: pkg-bugs => rverschelde
The Debian patch I mentioned before seems to no longer be available. Ubuntu says CVE-2016-9085 doesn't affect 0.4.x, and I can't find any information on CVE-2016-8888. Closing this.
Version: 5 => CauldronResolution: (none) => FIXEDStatus: REOPENED => RESOLVED