oss-sec mailing list archives

Re: CVE-2023-4863: libwebp: Heap buffer overflow in WebP Codec


From: Vincent Rabaud <vrabaud () google com>
Date: Fri, 22 Sep 2023 17:50:33 +0200

Clean-ups, no security issues there.

Le ven. 22 sept. 2023, 17:35, Solar Designer <solar () openwall com> a écrit :

On Fri, Sep 22, 2023 at 04:50:44PM +0200, Vincent Rabaud wrote:
Hi, we have commented on that here:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=62136#c7

Thank you!  I include the relevant comments below:

Comment 6 by t... () ritter vg on Mon, Sep 18, 2023, 4:58 PM GMT+2

Can I request a CVE assignment for this issue (so I can note it
correctly in Firefox advisories)?

Comment 7 by jz... () google com on Tue, Sep 19, 2023, 3:22 AM GMT+2

This was an incorrect check in an assert(). A release build would not be
negatively affected. The conditions were updated, but previously the
file would not cause an issue in that mode. Vincent, please correct me
if I'm wrong.

Comment 8 by vrabaud () google com on Tue, Sep 19, 2023, 11:08 AM GMT+2

Exactly. And instead of fixing the assert, the patch uses an early exit
to not reach the assert, which is also an optimization.

Vincent, what about these commits? -

commit dce8397fec159c9edfeec7c6388cb81428c87ed8
Author: Masahiro Hanada <hanada () atmark-techno com>
Date:   Thu Sep 14 19:37:24 2023 +0900

    Fix next is invalid pointer when WebPSafeMalloc fails

    When WebPSafeMalloc fails on VP8LHuffmanTablesAllocate,
    next is not initialized to NULL.
    VP8LHuffmanTablesDeallocate uses next to know the following nodes.
    A patch fixes this issue.

    Change-Id: I144ae84cd97e5bca227018ef1afa95361267902c

commit 433c7dca11bb5b001ce5ad36ac1afd2906a2f13e
Author: Vincent Rabaud <vrabaud () google com>
Date:   Thu Sep 14 09:31:19 2023 +0200

    Fix static analyzer warnings.

    Change-Id: I45f0db2310b1188809963af93240e3d438f807b8

The "next is not initialized to NULL" one sounds like it could mean
stale memory contents (possibly deliberately sprayed) could be used as a
pointer, so it could be a security issue.

The warnings fixes could be just that, or some of those warnings could
have been for real issues (perhaps also something used uninitialized).

In other words, are the issues fixed there known to be benign, are not
sufficiently researched, or researched and known to be vulnerabilities?

Alexander


Current thread: