#libWebP - security vulnerability Google's scam
Supplement: One of the most serious security vulnerabilities ever, with the highest CVE severity level of 10, has been discovered in connection with the *.webp image format. The image format developed by Google uses a library that is contained in pretty much all programmes that have something to do with images. This includes browsers, messengers (also Telegram), office programmes, programmes for image processing, etc. The vulnerability is now also being actively exploited. The vulnerability is now being actively exploited and an exploit for it is also already in circulation. On cyberkendra you can find a list with all affected programmes and which ones can already be patched: https://www.cyberkendra.com/2023/09/webp-0day-google-assign-new-cve-for.html... m=1 Günter Born (German) has a summary on the topic with further links: https://www.borncity.com/blog/2023/09/28/webp-schwachstelle-cve-2023-5129-be... What can you do: Update! As far as can be seen, at least all common browsers have already been patched. For all other programmes, you just have to look, check the version numbers and fight your way through. Kind regards M Be Free, Be Linux -------------------------------------------------------------
Sun, 01 Oct 2023 09:12:19 +0200 michael.kasimir@gmx.de :
Supplement: One of the most serious security vulnerabilities ever, with the highest CVE severity level of 10, has been discovered in connection with the *.webp image format. The image format developed by Google uses a library that is contained in pretty much all programmes that have something to do with images. This includes browsers, messengers (also Telegram), office programmes, programmes for image processing, etc. The vulnerability is now also being actively exploited. The vulnerability is now being actively exploited and an exploit for it is also already in circulation.
On cyberkendra you can find a list with all affected programmes and which ones can already be patched: https://www.cyberkendra.com/2023/09/webp-0day-google-assign-new-cve-for.html... m=1
Günter Born (German) has a summary on the topic with further links: https://www.borncity.com/blog/2023/09/28/webp-schwachstelle-cve-2023-5129-be...
What can you do: Update! As far as can be seen, at least all common browsers have already been patched. For all other programmes, you just have to look, check the version numbers and fight your way through.
Thanks for having taken the trouble...
participants (2)
-
bent fender
-
michael.kasimir@gmx.de