![]() ![]() ![]() Upgrade all versions to 32.9.0 or greater.Upgrade all versions to 1.35.0 or greater.The Cloud Foundry project recommends upgrading the following releases: Users of affected products are strongly encouraged to follow the mitigations below. Severity is medium unless otherwise noted. Affected Cloud Foundry Products and Versions Update Instructions: Run sudo pro fix USN-6369-1 to fix the vulnerability. If a user or automated system were tricked into opening a specially crafted image file, a remote attacker could use this issue to cause libwebp to crash, resulting in a denial of service, or possibly execute arbitrary code. It was discovered that libwebp incorrectly handled certain malformed images. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |