ID

VAR-202105-1461


CVE

CVE-2020-36328


TITLE

libwebp  Out-of-bounds Vulnerability in Microsoft

Trust: 0.8

sources: JVNDB: JVNDB-2018-016582

DESCRIPTION

A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. libwebp Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Versions of libwebp prior to 1.0.1 have security vulnerabilities. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. All OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor 3. Solution: For OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - -cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1813344 - CVE-2020-7598 nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload 1979134 - Placeholder bug for OCP 4.6.0 extras release 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: libwebp security update Advisory ID: RHSA-2021:2260-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2260 Issue date: 2021-06-07 CVE Names: CVE-2018-25011 CVE-2020-36328 CVE-2020-36329 ===================================================================== 1. Summary: An update for libwebp is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libwebp packages provide a library and tools for the WebP graphics format. WebP is an image format with a lossy compression of digital photographic images. WebP consists of a codec based on the VP8 format, and a container based on the Resource Interchange File Format (RIFF). Webmasters, web developers and browser developers can use WebP to compress, archive, and distribute digital images more efficiently. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libwebp-0.3.0-10.el7_9.src.rpm x86_64: libwebp-0.3.0-10.el7_9.i686.rpm libwebp-0.3.0-10.el7_9.x86_64.rpm libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm libwebp-devel-0.3.0-10.el7_9.i686.rpm libwebp-devel-0.3.0-10.el7_9.x86_64.rpm libwebp-java-0.3.0-10.el7_9.x86_64.rpm libwebp-tools-0.3.0-10.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libwebp-0.3.0-10.el7_9.src.rpm x86_64: libwebp-0.3.0-10.el7_9.i686.rpm libwebp-0.3.0-10.el7_9.x86_64.rpm libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm libwebp-devel-0.3.0-10.el7_9.i686.rpm libwebp-devel-0.3.0-10.el7_9.x86_64.rpm libwebp-java-0.3.0-10.el7_9.x86_64.rpm libwebp-tools-0.3.0-10.el7_9.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libwebp-0.3.0-10.el7_9.src.rpm ppc64: libwebp-0.3.0-10.el7_9.ppc.rpm libwebp-0.3.0-10.el7_9.ppc64.rpm libwebp-debuginfo-0.3.0-10.el7_9.ppc.rpm libwebp-debuginfo-0.3.0-10.el7_9.ppc64.rpm ppc64le: libwebp-0.3.0-10.el7_9.ppc64le.rpm libwebp-debuginfo-0.3.0-10.el7_9.ppc64le.rpm s390x: libwebp-0.3.0-10.el7_9.s390.rpm libwebp-0.3.0-10.el7_9.s390x.rpm libwebp-debuginfo-0.3.0-10.el7_9.s390.rpm libwebp-debuginfo-0.3.0-10.el7_9.s390x.rpm x86_64: libwebp-0.3.0-10.el7_9.i686.rpm libwebp-0.3.0-10.el7_9.x86_64.rpm libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: libwebp-debuginfo-0.3.0-10.el7_9.ppc.rpm libwebp-debuginfo-0.3.0-10.el7_9.ppc64.rpm libwebp-devel-0.3.0-10.el7_9.ppc.rpm libwebp-devel-0.3.0-10.el7_9.ppc64.rpm libwebp-java-0.3.0-10.el7_9.ppc64.rpm libwebp-tools-0.3.0-10.el7_9.ppc64.rpm ppc64le: libwebp-debuginfo-0.3.0-10.el7_9.ppc64le.rpm libwebp-devel-0.3.0-10.el7_9.ppc64le.rpm libwebp-java-0.3.0-10.el7_9.ppc64le.rpm libwebp-tools-0.3.0-10.el7_9.ppc64le.rpm s390x: libwebp-debuginfo-0.3.0-10.el7_9.s390.rpm libwebp-debuginfo-0.3.0-10.el7_9.s390x.rpm libwebp-devel-0.3.0-10.el7_9.s390.rpm libwebp-devel-0.3.0-10.el7_9.s390x.rpm libwebp-java-0.3.0-10.el7_9.s390x.rpm libwebp-tools-0.3.0-10.el7_9.s390x.rpm x86_64: libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm libwebp-devel-0.3.0-10.el7_9.i686.rpm libwebp-devel-0.3.0-10.el7_9.x86_64.rpm libwebp-java-0.3.0-10.el7_9.x86_64.rpm libwebp-tools-0.3.0-10.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libwebp-0.3.0-10.el7_9.src.rpm x86_64: libwebp-0.3.0-10.el7_9.i686.rpm libwebp-0.3.0-10.el7_9.x86_64.rpm libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm libwebp-devel-0.3.0-10.el7_9.i686.rpm libwebp-devel-0.3.0-10.el7_9.x86_64.rpm libwebp-java-0.3.0-10.el7_9.x86_64.rpm libwebp-tools-0.3.0-10.el7_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-25011 https://access.redhat.com/security/cve/CVE-2020-36328 https://access.redhat.com/security/cve/CVE-2020-36329 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYL4OxtzjgjWX9erEAQi1Yw//ZajpWKH7bKTBXifw2DXrc61fOReKCwR9 sQ/djSkMMo+hwhFNtqq9zHDmI81tuOzBRgzA0FzA6qeNZGzsJmNX/RrNgnep9um7 X08Dvb6+5VuHWBrrBv26wV5wGq/t2VKgGXSoJi6CDDDRlLn/RiAJzuZqhdhp3Ijn xBHIDIEYoNTYoDvbvZUVhY1kRKJ2sr3UxjcWPqDCNZdu51Z8ssW5up/Uh3NaY8yv iB7PIoIHrtBD0nGQcy5h4qE47wFbe9RdLTOaqGDAGaOrHWWT56eC72YnCYKMxO4K 8X9EXjhEmmH4a4Pl4dND7D1wiiOQe5kSA8IhYdgHVZQyo9WBJTD6g6C5IERwwjat s3Z7vhzA+/cLEo8+Jc5orRGoLArU5rOl4uqh64AEPaON9UB8bMOnqm24y+Ebyi0B S+zZ2kQ1FGeQIMnrjAer3OUcVnf26e6qNWBK+HCjdfmbhgtZxTtXyOKcM4lSFVcm LY8pLMWzZpcSCpYh15YtRRCWr4bJyX1UD8V3l2Zzek9zmFq5ogVX78KBYV3c4oWn ReVMDEpXb3bYoV/EsMk7WOaDBKM1eU2OjVp2e7r2Fnt8GESxSpZ1pKegkxXdPnmX EmPhXKZNnwh4Z4Aw2AYIsQVo9QTyvCnZjfjAy9WfIqbyg8OTGJOeQqQLlKsq6ddb YXjUcIgJv2g= =kWSg -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 7) - noarch 3. Description: The Qt Image Formats in an add-on module for the core Qt Gui library that provides support for additional image formats including MNG, TGA, TIFF, WBMP, and WebP. 8) - aarch64, ppc64le, s390x, x86_64 3. For the stable distribution (buster), these problems have been fixed in version 0.6.1-2+deb10u1. We recommend that you upgrade your libwebp packages. For the detailed security status of libwebp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libwebp Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmDCfg0ACgkQEMKTtsN8 TjaaKBAAqMJfe5aH4Gh14SpB7h2S5JJUK+eo/aPo1tXn7BoLiF4O5g05+McyUOdE HI9ibolUfv+HoZlCDC93MBJvopWgd1/oqReHML5n2GXPBESYXpRstL04qwaRqu9g AvofhX88EwHefTXmljVTL4W1KgMJuhhPxVLdimxoqd0/hjagZtA7B7R05khigC5k nHMFoRogSPjI9H4vI2raYaOqC26zmrZNbk/CRVhuUbtDOG9qy9okjc+6KM9RcbXC ha++EhrGXPjCg5SwrQAZ50nW3Jwif2WpSeULfTrqHr2E8nHGUCHDMMtdDwegFH/X FK0dVaNPgrayw1Dji+fhBQz3qR7pl/1DK+gsLtREafxY0+AxZ57kCi51CykT/dLs eC4bOPaoho91KuLFrT+X/AyAASS/00VuroFJB4sWQUvEpBCnWPUW1m3NvjsyoYuj 0wmQMVM5Bb/aYuWAM+/V9MeoklmtIn+OPAXqsVvLxdbB0GScwJV86/NvsN6Nde6c twImfMCK1V75FPrIsxx37M52AYWvALgXbWoVi4aQPyPeDerQdgUPL1FzTGzem0NQ PnXhuE27H/pJz79DosW8md0RFr+tfPgZ8CeTirXSUUXFiqhcXR/w1lqN2vlmfm8V dmwgzvu9A7ZhG++JRqbbMx2D+NS4coGgRdA7XPuRrdNKniRIDhQ= =pN/j -----END PGP SIGNATURE-----

Trust: 2.43

sources: NVD: CVE-2020-36328 // JVNDB: JVNDB-2018-016582 // VULHUB: VHN-391907 // VULMON: CVE-2020-36328 // PACKETSTORM: 163504 // PACKETSTORM: 162998 // PACKETSTORM: 163028 // PACKETSTORM: 163029 // PACKETSTORM: 163058 // PACKETSTORM: 163061 // PACKETSTORM: 169076

AFFECTED PRODUCTS

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:8.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:14.7

Trust: 1.0

vendor:applemodel:ipadosscope:eqversion:14.7

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:webmprojectmodel:libwebpscope:ltversion:1.0.1

Trust: 1.0

vendor:the webmmodel:libwebpscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:netappmodel:ontap select deploy administration utilityscope: - version: -

Trust: 0.8

vendor:レッドハットmodel:red hat enterprise linuxscope: - version: -

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-016582 // NVD: CVE-2020-36328

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-36328
value: CRITICAL

Trust: 1.0

NVD: CVE-2020-36328
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202105-1380
value: CRITICAL

Trust: 0.6

VULHUB: VHN-391907
value: HIGH

Trust: 0.1

VULMON: CVE-2020-36328
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-36328
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-391907
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-36328
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-36328
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-391907 // VULMON: CVE-2020-36328 // JVNDB: JVNDB-2018-016582 // CNNVD: CNNVD-202105-1380 // NVD: CVE-2020-36328

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:Out-of-bounds writing (CWE-787) [NVD Evaluation ]

Trust: 0.8

problemtype:CWE-119

Trust: 0.1

sources: VULHUB: VHN-391907 // JVNDB: JVNDB-2018-016582 // NVD: CVE-2020-36328

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202105-1380

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202105-1380

PATCH

title:Bug 1956829url:https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html

Trust: 0.8

title:libwebp Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=151879

Trust: 0.6

title:Debian Security Advisories: DSA-4930-1 libwebp -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=6dad0021173658916444dfc89f8d2495

Trust: 0.1

sources: VULMON: CVE-2020-36328 // JVNDB: JVNDB-2018-016582 // CNNVD: CNNVD-202105-1380

EXTERNAL IDS

db:NVDid:CVE-2020-36328

Trust: 4.1

db:PACKETSTORMid:163058

Trust: 0.8

db:PACKETSTORMid:163504

Trust: 0.8

db:PACKETSTORMid:163028

Trust: 0.8

db:PACKETSTORMid:162998

Trust: 0.8

db:JVNDBid:JVNDB-2018-016582

Trust: 0.8

db:CNNVDid:CNNVD-202105-1380

Trust: 0.7

db:CS-HELPid:SB2021090829

Trust: 0.6

db:CS-HELPid:SB2021072216

Trust: 0.6

db:CS-HELPid:SB2021061420

Trust: 0.6

db:CS-HELPid:SB2021060725

Trust: 0.6

db:CS-HELPid:SB2021060939

Trust: 0.6

db:CS-HELPid:SB2021071517

Trust: 0.6

db:PACKETSTORMid:163645

Trust: 0.6

db:AUSCERTid:ESB-2021.1965

Trust: 0.6

db:AUSCERTid:ESB-2021.2102

Trust: 0.6

db:AUSCERTid:ESB-2021.1880

Trust: 0.6

db:AUSCERTid:ESB-2021.1959

Trust: 0.6

db:AUSCERTid:ESB-2021.2485.2

Trust: 0.6

db:AUSCERTid:ESB-2021.2388

Trust: 0.6

db:AUSCERTid:ESB-2021.2036

Trust: 0.6

db:AUSCERTid:ESB-2021.2070

Trust: 0.6

db:PACKETSTORMid:163061

Trust: 0.2

db:PACKETSTORMid:163029

Trust: 0.2

db:VULHUBid:VHN-391907

Trust: 0.1

db:VULMONid:CVE-2020-36328

Trust: 0.1

db:PACKETSTORMid:169076

Trust: 0.1

sources: VULHUB: VHN-391907 // VULMON: CVE-2020-36328 // JVNDB: JVNDB-2018-016582 // PACKETSTORM: 163504 // PACKETSTORM: 162998 // PACKETSTORM: 163028 // PACKETSTORM: 163029 // PACKETSTORM: 163058 // PACKETSTORM: 163061 // PACKETSTORM: 169076 // CNNVD: CNNVD-202105-1380 // NVD: CVE-2020-36328

REFERENCES

url:https://www.debian.org/security/2021/dsa-4930

Trust: 1.9

url:https://support.apple.com/kb/ht212601

Trust: 1.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=1956829

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20211112-0001/

Trust: 1.7

url:http://seclists.org/fulldisclosure/2021/jul/54

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-36328

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-36329

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-25011

Trust: 0.7

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-36329

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-36328

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2018-25011

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1959

Trust: 0.6

url:https://packetstormsecurity.com/files/163028/red-hat-security-advisory-2021-2328-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021060725

Trust: 0.6

url:https://vigilance.fr/vulnerability/libwebp-five-vulnerabilities-35580

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2485.2

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1965

Trust: 0.6

url:https://packetstormsecurity.com/files/163504/red-hat-security-advisory-2021-2643-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072216

Trust: 0.6

url:https://packetstormsecurity.com/files/162998/red-hat-security-advisory-2021-2260-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163058/red-hat-security-advisory-2021-2365-01.html

Trust: 0.6

url:https://support.apple.com/en-us/ht212601

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021060939

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1880

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021061420

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021071517

Trust: 0.6

url:https://packetstormsecurity.com/files/163645/apple-security-advisory-2021-07-21-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2036

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2102

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2388

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2070

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021090829

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-25014

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3583

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7598

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3570

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2021:2641

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7598

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3570

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3583

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.6/updating/updating-cluster

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2260

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2328

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25014

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2354

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2365

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2364

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36332

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36330

Trust: 0.1

url:https://security-tracker.debian.org/tracker/libwebp

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36331

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25013

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25009

Trust: 0.1

sources: VULHUB: VHN-391907 // VULMON: CVE-2020-36328 // JVNDB: JVNDB-2018-016582 // PACKETSTORM: 163504 // PACKETSTORM: 162998 // PACKETSTORM: 163028 // PACKETSTORM: 163029 // PACKETSTORM: 163058 // PACKETSTORM: 163061 // PACKETSTORM: 169076 // CNNVD: CNNVD-202105-1380 // NVD: CVE-2020-36328

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 163504 // PACKETSTORM: 162998 // PACKETSTORM: 163028 // PACKETSTORM: 163029 // PACKETSTORM: 163058 // PACKETSTORM: 163061

SOURCES

db:VULHUBid:VHN-391907
db:VULMONid:CVE-2020-36328
db:JVNDBid:JVNDB-2018-016582
db:PACKETSTORMid:163504
db:PACKETSTORMid:162998
db:PACKETSTORMid:163028
db:PACKETSTORMid:163029
db:PACKETSTORMid:163058
db:PACKETSTORMid:163061
db:PACKETSTORMid:169076
db:CNNVDid:CNNVD-202105-1380
db:NVDid:CVE-2020-36328

LAST UPDATE DATE

2024-11-23T20:34:12.465000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-391907date:2023-01-09T00:00:00
db:VULMONid:CVE-2020-36328date:2021-07-23T00:00:00
db:JVNDBid:JVNDB-2018-016582date:2022-01-27T09:07:00
db:CNNVDid:CNNVD-202105-1380date:2021-11-15T00:00:00
db:NVDid:CVE-2020-36328date:2023-01-09T16:41:59.350

SOURCES RELEASE DATE

db:VULHUBid:VHN-391907date:2021-05-21T00:00:00
db:VULMONid:CVE-2020-36328date:2021-05-21T00:00:00
db:JVNDBid:JVNDB-2018-016582date:2022-01-27T00:00:00
db:PACKETSTORMid:163504date:2021-07-14T15:29:37
db:PACKETSTORMid:162998date:2021-06-07T13:58:06
db:PACKETSTORMid:163028date:2021-06-09T13:21:49
db:PACKETSTORMid:163029date:2021-06-09T13:22:14
db:PACKETSTORMid:163058date:2021-06-10T13:39:19
db:PACKETSTORMid:163061date:2021-06-10T13:42:06
db:PACKETSTORMid:169076date:2021-06-28T19:12:00
db:CNNVDid:CNNVD-202105-1380date:2021-05-21T00:00:00
db:NVDid:CVE-2020-36328date:2021-05-21T17:15:08.270