First published: Tue May 04 2021(Updated: )
A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libwebp | 0.6.1-2+deb10u1 0.6.1-2+deb10u3 0.6.1-2.1+deb11u2 1.2.4-0.2+deb12u1 1.3.2-0.3 | |
Webmproject Libwebp | <1.0.1 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
NetApp ONTAP Select Deploy administration utility | ||
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Apple iPadOS | <14.7 | |
Apple iPhone OS | <14.7 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
redhat/libwebp | <1.0.1 | 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw in libwebp is CVE-2020-36329.
CVE-2020-36329 has a severity rating of 9.8 (Critical).
The affected software includes IBM Cloud Pak for Security (CP4S), Mozilla Firefox ESR, Redhat Enterprise Linux, NetApp ONTAP Select Deploy administration utility, Debian Debian Linux, Apple iPadOS, and Apple iPhone OS.
The vulnerability in libwebp could allow a remote attacker to execute arbitrary code on the system, obtain sensitive information, or cause a denial of service.
Yes, there are fixes and patches available for CVE-2020-36329. It is recommended to update to libwebp version 1.0.1 or later to mitigate this vulnerability.