First published: Tue May 04 2021(Updated: )
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libwebp | 0.6.1-2+deb10u1 0.6.1-2+deb10u3 0.6.1-2.1+deb11u2 1.2.4-0.2+deb12u1 1.3.2-0.3 | |
Webmproject Libwebp | <1.0.1 | |
Redhat Enterprise Linux | =8.0 | |
NetApp ONTAP Select Deploy administration utility | ||
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Apple iPadOS | <14.7 | |
Apple iPhone OS | <14.7 | |
redhat/libwebp | <1.0.1 | 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2020-36331.
The severity of CVE-2020-36331 is critical with a score of 9.1.
The affected software for CVE-2020-36331 includes libwebp versions before 1.0.1, Mozilla Firefox ESR, Redhat Enterprise Linux, NetApp ONTAP Select Deploy administration utility, Debian Debian Linux, Apple iPadOS, and Apple iPhone OS.
The highest threat from CVE-2020-36331 is to data confidentiality and service availability.
You can find more information about CVE-2020-36331 at the following references: [1] http://seclists.org/fulldisclosure/2021/Jul/54, [2] https://bugzilla.redhat.com/show_bug.cgi?id=1956856, [3] https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html