vulnerability
Red Hat: CVE-2020-36328: CVE-2020-36328 libwebp: heap-based buffer overflow in WebPDecode*Into functions (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | May 21, 2021 | Jun 8, 2021 | Aug 11, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 21, 2021
Added
Jun 8, 2021
Modified
Aug 11, 2025
Description
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Solutions
redhat-upgrade-libwebpredhat-upgrade-libwebp-debuginforedhat-upgrade-libwebp-debugsourceredhat-upgrade-libwebp-develredhat-upgrade-libwebp-javaredhat-upgrade-libwebp-java-debuginforedhat-upgrade-libwebp-toolsredhat-upgrade-libwebp-tools-debuginforedhat-upgrade-qt5-qtimageformatsredhat-upgrade-qt5-qtimageformats-debuginforedhat-upgrade-qt5-qtimageformats-doc
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.