DEBIAN-CVE-2020-36328

Source
https://security-tracker.debian.org/tracker/CVE-2020-36328
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2020-36328.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2020-36328
Upstream
Published
2021-05-21T17:15:08Z
Modified
2025-09-19T06:19:08Z
Summary
[none]
Details

A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

References

Affected packages

Debian:11 / libwebp

Package

Name
libwebp
Purl
pkg:deb/debian/libwebp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.1-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libwebp

Package

Name
libwebp
Purl
pkg:deb/debian/libwebp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.1-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libwebp

Package

Name
libwebp
Purl
pkg:deb/debian/libwebp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.1-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / libwebp

Package

Name
libwebp
Purl
pkg:deb/debian/libwebp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.1-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}