{"id":"CVE-2023-1999","details":"There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.","modified":"2026-03-14T11:57:56.635830Z","published":"2023-06-20T12:15:09.600Z","related":["ALSA-2023:2076","ALSA-2023:2078","SUSE-SU-2023:2064-1","SUSE-SU-2023:2467-1","SUSE-SU-2023:2490-1","SUSE-SU-2023:2552-1","openSUSE-SU-2024:13019-1"],"references":[{"type":"WEB","url":"https://chromium.googlesource.com/webm/libwebp"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-05"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/webmproject/libwebp","events":[{"introduced":"6a2209aa366a4648c9d74d3434457d704f0a8fe1"},{"fixed":"fd7bb21c0cb56e8a82e9bfa376164b842f433f3b"}],"database_specific":{"versions":[{"introduced":"0.4.2"},{"fixed":"1.3.1"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-1999.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}