diff options
author | Soumya <soumya.sambu@windriver.com> | 2023-07-17 03:29:31 +0000 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2023-07-21 06:27:34 -1000 |
commit | df5e8bcceb48cc009dc3404945ec59c4f80dee12 (patch) | |
tree | fe2139d609d1b81237a4f99b0a1755d9cdecaeaa /scripts/pybootchartgui/pybootchartgui.py | |
parent | aeb3b3fa0735b04879858832c2513d2a435e46e6 (diff) | |
download | poky-df5e8bcceb48cc009dc3404945ec59c4f80dee12.tar.gz |
libwebp: Fix CVE-2023-1999
There exists a use after free/double free in libwebp. An attacker can
use the ApplyFiltersAndEncode() function and loop through to free
best.bw and assign best = trial pointer. The second loop will then
return 0 because of an Out of memory error in VP8 encoder, the pointer
is still assigned to trial and the AddressSanitizer will attempt a double free.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2023-1999
Upstream patch:
https://github.com/webmproject/libwebp/commit/a486d800b60d0af4cc0836bf7ed8f21e12974129
(From OE-Core rev: a5d0f8734ca643c25f0952387b38edf8ffd70525)
Signed-off-by: Soumya <soumya.sambu@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/pybootchartgui/pybootchartgui.py')
0 files changed, 0 insertions, 0 deletions