A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2021/Jul/54 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1956829 | Issue Tracking Patch Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20211112-0001/ | Third Party Advisory |
https://support.apple.com/kb/HT212601 | Third Party Advisory |
https://www.debian.org/security/2021/dsa-4930 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2021-05-21T16:14:21
Updated: 2021-11-12T08:06:24
Reserved: 2021-05-04T00:00:00
Link: CVE-2020-36328
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-21T17:15:08.270
Modified: 2023-01-09T16:41:59.350
Link: CVE-2020-36328
JSON object: View
Redhat Information
No data.
CWE