logo

GHSA-9q78-27f3-2jmh webp

Package

Manager: cargo
Name: webp
Vulnerable Version: >=0 <0.3.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:F/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

EPSS: N/A pctlN/A

Details

webp crate may expose memory contents when encoding an image Affected versions of this crate did not check that the input slice passed to `"webp::Encoder::encode()` is large enough for the specified image dimensions. If the input slice is too short, the library will read out of bounds of the buffer and encode other memory contents as an image, resulting in memory exposure or a segmentation fault. The flaw was corrected in [pull request #44](https://github.com/jaredforth/webp/pull/44) by always validating the input buffer size when constructing the encoder.

Metadata

Created: 2025-08-29T20:30:04Z
Modified: 2025-08-29T20:30:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/08/GHSA-9q78-27f3-2jmh/GHSA-9q78-27f3-2jmh.json
CWE IDs: ["CWE-125"]
Alternative ID: N/A
Finding: F111
Auto approve: 1