CVE-2018-25011 / CVE-2020-36328 / CVE-2020-36329: libwebp multiple CVEs
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
Medium
|
Joe Slater |
Bug Description
CVE-2018-25011: libwebp: heap-based buffer overflow in PutLE16()
CVE-2020-36328: libwebp: heap-based buffer overflow in WebPDecode*Into functions
CVE-2020-36329: libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c
Score:
cve_id status cvss2Score av ac au ai
CVE-2018-25011 fixed 7.5 N L N P
CVE-2020-36328 fixed 7.5 N L N P
CVE-2020-36329 fixed 7.5 N L N P
Description:
CVE-2018-25011: A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow was found in PutLE16(). The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVE-2020-36328: A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVE-2020-36329: A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References:
https:/
https:/
https:/
https:/
http://
Required Package Versions:
libwebp-
Packages:
libwebp
Found during December 2021 CVE Scan
CVE References
description: | updated |
Changed in starlingx: | |
assignee: | Yue Tao (wrytao) → Joe Slater (jslater0wind) |
Changed in starlingx: | |
importance: | High → Medium |
tags: | added: in-r-stx60 |
tags: | removed: stx.cherrypickneeded |
Screening: Marking as medium priority as this CVE meets the StarlingX fix criteria. Should be fixed in stx master and cherrypicked to the r/stx.6.0 release branch at some point. However, we will not hold up the stx.6.0 release on this as CVEs can be reported at any time.