There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.
References
Link | Resource |
---|---|
https://chromium.googlesource.com/webm/libwebp | Product |
https://security.gentoo.org/glsa/202309-05 |
Configurations
History
No history.
Information
Published : 2023-06-20 12:15
Updated : 2023-09-17 09:15
NVD link : CVE-2023-1999
Mitre link : CVE-2023-1999
CVE.ORG link : CVE-2023-1999
JSON object : View
Products Affected
webmproject
- libwebp