{"id":"CVE-2020-36332","details":"A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.","modified":"2026-04-11T12:34:44.089213Z","published":"2021-05-21T17:15:08.443Z","related":["ALSA-2021:4231","SUSE-SU-2021:1830-1","SUSE-SU-2021:1860-1","openSUSE-SU-2021:1860-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"}]},"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20211104-0004/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4930"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956868"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/webmproject/libwebp","events":[{"introduced":"0"},{"fixed":"e85d3313d6d52b1e9c6c181b488fc0831a747de8"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"1.0.1"}],"cpe":"cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:*"}}],"versions":["v0.1.2","v0.1.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-36332.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}