Bug 1217159 (CVE-2023-1999)

Summary: VUL-0: CVE-2023-1999: libwebp: There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because ...
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: meissner, rfrohl
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/385274/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-1999:7.5:(AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2023-11-15 08:56:00 UTC
There exists a use after free/double free in libwebp. An attacker can use
the ApplyFiltersAndEncode() function and loop through to free best.bw and assign
best = trial pointer. The second loop will then return 0 because of an Out of
memory error in VP8 encoder, the pointer is still assigned to trial and the
AddressSanitizer will attempt a double free. 


References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-1999
Comment 1 Robert Frohl 2024-06-10 09:18:47 UTC
done, closing