A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow was found in PutLE16(). The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1956919 | Issue Tracking Patch Release Notes Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html | Mailing List Third Party Advisory |
| https://www.debian.org/security/2021/dsa-4930 | Third Party Advisory |
| https://support.apple.com/kb/HT212601 | Third Party Advisory |
| http://seclists.org/fulldisclosure/2021/Jul/54 | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20211104-0004/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2021-05-21 17:15
Updated : 2021-11-30 22:00
NVD link : CVE-2018-25011
Mitre link : CVE-2018-25011
JSON object : View
Products Affected
redhat
- enterprise_linux
apple
- iphone_os
- ipados
debian
- debian_linux
webmproject
- libwebp
netapp
- ontap_select_deploy_administration_utility
CWE
CWE-787
Out-of-bounds Write
