A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1956868 | patch third party advisory issue tracking |
https://www.debian.org/security/2021/dsa-4930 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20211104-0004/ | third party advisory |