{"id":"USN-4971-2","summary":"libwebp vulnerabilities","details":"USN-4971-1 fixed several vulnerabilities in libwebp. This update provides\nthe corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.\n\nOriginal advisory details:\n\n It was discovered that libwebp incorrectly handled certain malformed\n images. If a user or automated system were tricked into opening a specially\n crafted image file, a remote attacker could use this issue to cause libwebp\n to crash, resulting in a denial of service, or possibly execute arbitrary\n code.\n","modified":"2026-02-10T04:42:12Z","published":"2021-06-10T13:12:37Z","related":["UBUNTU-CVE-2018-25009","UBUNTU-CVE-2018-25010","UBUNTU-CVE-2018-25011","UBUNTU-CVE-2018-25012","UBUNTU-CVE-2018-25013","UBUNTU-CVE-2018-25014","UBUNTU-CVE-2020-36328","UBUNTU-CVE-2020-36329","UBUNTU-CVE-2020-36330","UBUNTU-CVE-2020-36331"],"upstream":["CVE-2018-25009","CVE-2018-25010","CVE-2018-25011","CVE-2018-25012","CVE-2018-25013","CVE-2018-25014","CVE-2020-36328","CVE-2020-36329","CVE-2020-36330","CVE-2020-36331","UBUNTU-CVE-2018-25009","UBUNTU-CVE-2018-25010","UBUNTU-CVE-2018-25011","UBUNTU-CVE-2018-25012","UBUNTU-CVE-2018-25013","UBUNTU-CVE-2018-25014","UBUNTU-CVE-2020-36328","UBUNTU-CVE-2020-36329","UBUNTU-CVE-2020-36330","UBUNTU-CVE-2020-36331"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4971-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-25009"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-25010"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-25011"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-25012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-25013"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-25014"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-36328"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-36329"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-36330"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-36331"}],"affected":[{"package":{"name":"libwebp","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/libwebp@0.4.0-4ubuntu0.1~esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.4.0-4ubuntu0.1~esm1"}]}],"versions":["0.3.0-3","0.4.0-4"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"libwebp-dev","binary_version":"0.4.0-4ubuntu0.1~esm1"},{"binary_name":"libwebp5","binary_version":"0.4.0-4ubuntu0.1~esm1"},{"binary_name":"libwebpdemux1","binary_version":"0.4.0-4ubuntu0.1~esm1"},{"binary_name":"libwebpmux1","binary_version":"0.4.0-4ubuntu0.1~esm1"},{"binary_name":"webp","binary_version":"0.4.0-4ubuntu0.1~esm1"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-25009","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25010","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25011","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25012","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25013","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25014","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36328","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36329","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36330","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36331","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4971-2.json"}},{"package":{"name":"libwebp","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/libwebp@0.4.4-1ubuntu0.1~esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.4.4-1ubuntu0.1~esm1"}]}],"versions":["0.4.3-1.3","0.4.3-1.3build1","0.4.4-1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"libwebp-dev","binary_version":"0.4.4-1ubuntu0.1~esm1"},{"binary_name":"libwebp5","binary_version":"0.4.4-1ubuntu0.1~esm1"},{"binary_name":"libwebpdemux1","binary_version":"0.4.4-1ubuntu0.1~esm1"},{"binary_name":"libwebpmux1","binary_version":"0.4.4-1ubuntu0.1~esm1"},{"binary_name":"webp","binary_version":"0.4.4-1ubuntu0.1~esm1"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-25009","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25010","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25011","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25012","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25013","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-25014","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36328","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36329","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36330","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36331","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4971-2.json"}}],"schema_version":"1.7.3"}