vulnerability
Amazon Linux 2023: CVE-2023-1999: Important priority package update for libwebp
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | Apr 11, 2023 | Feb 17, 2025 | Jul 9, 2025 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Apr 11, 2023
Added
Feb 17, 2025
Modified
Jul 9, 2025
Description
There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.
The Mozilla Foundation Security Advisory describes this flaw as:
A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.
The Mozilla Foundation Security Advisory describes this flaw as:
A double-free in libwebp could have led to memory corruption and a potentially exploitable crash.
Solutions
amazon-linux-2023-upgrade-libwebpamazon-linux-2023-upgrade-libwebp-debuginfoamazon-linux-2023-upgrade-libwebp-debugsourceamazon-linux-2023-upgrade-libwebp-develamazon-linux-2023-upgrade-libwebp-javaamazon-linux-2023-upgrade-libwebp-java-debuginfoamazon-linux-2023-upgrade-libwebp-toolsamazon-linux-2023-upgrade-libwebp-tools-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.