登录
注册
开源
企业版
高校版
搜索
帮助中心
使用条款
关于我们
开源
企业版
高校版
私有云
模力方舟
AI 队友
登录
注册
轻量养虾,开箱即用!低 Token + 稳定算力,Gitee & 模力方舟联合出品的 PocketClaw 正式开售!点击了解详情
代码拉取完成,页面将自动刷新
仓库状态说明
捐赠
捐赠前请先登录
取消
前往登录
扫描微信二维码支付
取消
支付完成
支付提示
将跳转至支付宝完成支付
确定
取消
Watch
不关注
关注所有动态
仅关注版本发行动态
关注但不提醒动态
9
Star
1
Fork
28
src-openEuler
/
mozjs78
关闭
代码
Issues
143
Pull Requests
3
Wiki
统计
流水线
服务
JavaDoc
PHPDoc
质量分析
Jenkins for Gitee
腾讯云托管
腾讯云 Serverless
悬镜安全
阿里云 SAE
Codeblitz
SBOM
开发画像分析
我知道了,不再自动展开
更新失败,请稍后重试!
移除标识
内容风险标识
本任务被
标识为内容中包含有代码安全 Bug 、隐私泄露等敏感信息,仓库外成员不可访问
CVE-2023-1999
已挂起
#ICNN3Y
CVE和安全问题
openLiBing-bot
创建于
2025-07-21 12:04
一、漏洞信息 漏洞编号:[CVE-2023-1999](https://nvd.nist.gov/vuln/detail/CVE-2023-1999) 漏洞归属组件:[mozjs78](https://gitee.com/src-openeuler/mozjs78) 漏洞归属的版本:78.15.0,78.4.0 CVSS V3.0分值: BaseScore:5.3 Medium Vector:CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N 漏洞简述: A use-after-free/double-free vulnerability exists in libwebp. An attacker can exploit the ApplyFiltersAndEncode() function to loop through freeing best.bw and assigning the best pointer to trial. The second loop returns 0 due to an out-of-memory error in the VP8 encoder, while the pointer remains assigned to trial, causing AddressSanitizer to attempt a double-free. 漏洞公开时间:2023-06-20 20:15:09 漏洞创建时间:2025-07-21 12:04:27 漏洞详情参考链接: https://nvd.nist.gov/vuln/detail/CVE-2023-1999 <details> <summary>更多参考(点击展开)</summary> | 参考来源 | 参考链接 | 来源链接 | | ------- | -------- | -------- | | | https://www.debian.org/lts/security/2023/dla-3400 | | | | https://www.auscert.org.au/bulletins/ESB-2023.3839 | | | | https://bugzilla.suse.com/1210212 | | | | https://www.mozilla.org/en-US/security/advisories/mfsa2023-14/#CVE-2023-1999 | | | | https://www.cve.org/CVERecord?id=CVE-2023-1999 | | | | https://secdb.alpinelinux.org/v3.18/main.yaml | | | | https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-1999/ | | | | https://www.auscert.org.au/bulletins/ESB-2023.3060 | | | | https://security.gentoo.org/glsa/202309-05 | | | | https://ubuntu.com/security/notices/USN-6078-2 | | | | https://www.debian.org/security/2023/dsa-5385 | | | | https://www.suse.com/support/security/rating/ | | | | https://linux.oracle.com/errata/ELSA-2023-2076.html | | | | https://bugzilla.mozilla.org/show_bug.cgi?id=1819244 | | | | http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-1999 | | | | https://cxsecurity.com/cveshow/CVE-2023-1999/ | | | | https://www.suse.com/security/cve/CVE-2023-29548/ | | | | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999 | | | | https://errata.rockylinux.org/RLSA-2023:2078 | | | | https://www.suse.com/support/update/announcement/2023/suse-su-20232064-1/ | | | | https://lists.suse.com/pipermail/sle-updates/2023-June/029773.html | | | | https://www.auscert.org.au/bulletins/ESB-2023.2766 | | | | https://secdb.alpinelinux.org/v3.16/main.yaml | | | | https://nvd.nist.gov/vuln/detail/CVE-2023-1999 | | | | https://access.redhat.com/errata/RHSA-2023:2076 | | | | https://www.suse.com/security/cve/CVE-2023-1999/ | | | | https://www.debian.org/lts/security/2023/dla-3439 | | | | https://linux.oracle.com/cve/CVE-2023-1999.html | | | | https://www.suse.com/security/cve/CVE-2023-29539/ | | | | https://access.redhat.com/security/cve/CVE-2023-1999 | | | | https://www.auscert.org.au/bulletins/ESB-2023.3438 | | | | https://www.auscert.org.au/bulletins/ESB-2023.2952 | | | | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1999 | | | | https://access.redhat.com/security/cve/cve-2023-1999 | | | | https://www.auscert.org.au/bulletins/ESB-2023.3092 | | | | https://bugzilla.suse.com/1217159 | | | | https://errata.almalinux.org/8/ALSA-2023-2076.html | | | | https://bugzilla.suse.com/1213054 | | | | https://www.suse.com/security/cve/CVE-2023-29550/ | | | | https://security-tracker.debian.org/tracker/CVE-2023-1999 | | | | https://secdb.alpinelinux.org/v3.17/main.yaml | | | | https://www.suse.com/security/cve/CVE-2023-29531/ | | | | https://www.suse.com/security/cve/CVE-2023-29541/ | | | | https://secdb.alpinelinux.org/edge/main.yaml | | | | https://www.debian.org/security/2023/dsa-5408 | | | | https://errata.rockylinux.org/RLSA-2023:2076 | | | | https://www.suse.com/security/cve/CVE-2023-29533/ | | | | https://www.debian.org/lts/security/2023/dla-3391 | | | | https://www.suse.com/security/cve/CVE-2023-1999.html | | | | https://www.debian.org/security/2023/dsa-5392 | | | | https://www.suse.com/security/cve/CVE-2023-0547/ | | | | https://ubuntu.com/security/notices/USN-6078-1 | | | | https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/#CVE-2023-1999 | | | | https://access.redhat.com/errata/RHSA-2023:2078 | | | | https://www.auscert.org.au/bulletins/ESB-2023.2470 | | | | https://www.suse.com/security/cve/CVE-2023-29532/ | | | | https://www.suse.com/security/cve/CVE-2023-29542/ | | | | https://bugzilla.redhat.com/show_bug.cgi?id=2186102 | | | | https://www.auscert.org.au/bulletins/ESB-2023.3346 | | | | https://www.suse.com/support/update/announcement/2023/suse-su-20232467-1/ | | | | https://secdb.alpinelinux.org/v3.15/main.yaml | | | | https://vigilance.fr/vulnerability/libwebp-double-free-41265 | | | | https://errata.almalinux.org/9/ALSA-2023-2078.html | | | | https://www.suse.com/security/cve/CVE-2023-29536/ | | | | https://www.mozilla.org/en-US/security/advisories/mfsa2023-13/#CVE-2023-1999 | | | | https://www.suse.com/security/cve/CVE-2023-29479/ | | | | https://bugzilla.redhat.com/2186102 | | | | https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html | | | | https://www.suse.com/security/cve/CVE-2023-29545/ | | | | https://chromium.googlesource.com/webm/libwebp | | | | https://www.suse.com/security/cve/CVE-2023-29535/ | | | | https://www.suse.com/security/cve/CVE-2023-1945/ | | </details> 漏洞分析指导链接: https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md 漏洞数据来源: 其他 漏洞补丁信息: <details> <summary>详情(点击展开)</summary> | 影响的包 | 修复版本 | 修复补丁 | 问题引入补丁 | 来源 | | ------- | -------- | ------- | -------- | --------- | | webmproject/libwebp | | https://github.com/webmproject/libwebp/commit/a486d800b60d0af4cc0836bf7ed8f21e12974129.patch | | ljqc | </details> 二、漏洞分析结构反馈 影响性分析说明: There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free. openEuler评分: 7.5 Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 受影响版本排查(受影响/不受影响): 1.master(78.15.0):受影响 2.openEuler-20.03-LTS-SP4(78.4.0):受影响 3.openEuler-22.03-LTS-SP3:受影响 4.openEuler-22.03-LTS-SP4:受影响 5.openEuler-24.03-LTS(78.15.0):不受影响 6.openEuler-24.03-LTS-Next(78.15.0):不受影响 7.openEuler-24.03-LTS-SP1:不受影响 8.openEuler-24.03-LTS-SP2:不受影响 9.openEuler-24.03-LTS-SP3:不受影响 修复是否涉及abi变化(是/否): 1.master(78.15.0):否 2.openEuler-20.03-LTS-SP4(78.4.0):否 3.openEuler-22.03-LTS-SP3:否 4.openEuler-22.03-LTS-SP4:否 5.openEuler-24.03-LTS(78.15.0):否 6.openEuler-24.03-LTS-Next(78.15.0):否 7.openEuler-24.03-LTS-SP1:否 8.openEuler-24.03-LTS-SP2:否 9.openEuler-24.03-LTS-SP3:否 原因说明: 1.master(78.15.0):暂不修复-暂无解决方案或补丁 2.openEuler-20.03-LTS-SP4(78.4.0):暂不修复-暂无解决方案或补丁 3.openEuler-22.03-LTS-SP3:暂不修复-暂无解决方案或补丁 4.openEuler-22.03-LTS-SP4:暂不修复-暂无解决方案或补丁 5.openEuler-24.03-LTS(78.15.0):不受影响-漏洞代码不存在 6.openEuler-24.03-LTS-Next(78.15.0):不受影响-漏洞代码不存在 7.openEuler-24.03-LTS-SP1:不受影响-漏洞代码不存在 8.openEuler-24.03-LTS-SP2:不受影响-漏洞代码不存在 9.openEuler-24.03-LTS-SP3:不受影响-漏洞代码不存在
一、漏洞信息 漏洞编号:[CVE-2023-1999](https://nvd.nist.gov/vuln/detail/CVE-2023-1999) 漏洞归属组件:[mozjs78](https://gitee.com/src-openeuler/mozjs78) 漏洞归属的版本:78.15.0,78.4.0 CVSS V3.0分值: BaseScore:5.3 Medium Vector:CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N 漏洞简述: A use-after-free/double-free vulnerability exists in libwebp. An attacker can exploit the ApplyFiltersAndEncode() function to loop through freeing best.bw and assigning the best pointer to trial. The second loop returns 0 due to an out-of-memory error in the VP8 encoder, while the pointer remains assigned to trial, causing AddressSanitizer to attempt a double-free. 漏洞公开时间:2023-06-20 20:15:09 漏洞创建时间:2025-07-21 12:04:27 漏洞详情参考链接: https://nvd.nist.gov/vuln/detail/CVE-2023-1999 <details> <summary>更多参考(点击展开)</summary> | 参考来源 | 参考链接 | 来源链接 | | ------- | -------- | -------- | | | https://www.debian.org/lts/security/2023/dla-3400 | | | | https://www.auscert.org.au/bulletins/ESB-2023.3839 | | | | https://bugzilla.suse.com/1210212 | | | | https://www.mozilla.org/en-US/security/advisories/mfsa2023-14/#CVE-2023-1999 | | | | https://www.cve.org/CVERecord?id=CVE-2023-1999 | | | | https://secdb.alpinelinux.org/v3.18/main.yaml | | | | https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-1999/ | | | | https://www.auscert.org.au/bulletins/ESB-2023.3060 | | | | https://security.gentoo.org/glsa/202309-05 | | | | https://ubuntu.com/security/notices/USN-6078-2 | | | | https://www.debian.org/security/2023/dsa-5385 | | | | https://www.suse.com/support/security/rating/ | | | | https://linux.oracle.com/errata/ELSA-2023-2076.html | | | | https://bugzilla.mozilla.org/show_bug.cgi?id=1819244 | | | | http://people.ubuntu.com/~ubuntu-security/cve/CVE-2023-1999 | | | | https://cxsecurity.com/cveshow/CVE-2023-1999/ | | | | https://www.suse.com/security/cve/CVE-2023-29548/ | | | | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999 | | | | https://errata.rockylinux.org/RLSA-2023:2078 | | | | https://www.suse.com/support/update/announcement/2023/suse-su-20232064-1/ | | | | https://lists.suse.com/pipermail/sle-updates/2023-June/029773.html | | | | https://www.auscert.org.au/bulletins/ESB-2023.2766 | | | | https://secdb.alpinelinux.org/v3.16/main.yaml | | | | https://nvd.nist.gov/vuln/detail/CVE-2023-1999 | | | | https://access.redhat.com/errata/RHSA-2023:2076 | | | | https://www.suse.com/security/cve/CVE-2023-1999/ | | | | https://www.debian.org/lts/security/2023/dla-3439 | | | | https://linux.oracle.com/cve/CVE-2023-1999.html | | | | https://www.suse.com/security/cve/CVE-2023-29539/ | | | | https://access.redhat.com/security/cve/CVE-2023-1999 | | | | https://www.auscert.org.au/bulletins/ESB-2023.3438 | | | | https://www.auscert.org.au/bulletins/ESB-2023.2952 | | | | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-1999 | | | | https://access.redhat.com/security/cve/cve-2023-1999 | | | | https://www.auscert.org.au/bulletins/ESB-2023.3092 | | | | https://bugzilla.suse.com/1217159 | | | | https://errata.almalinux.org/8/ALSA-2023-2076.html | | | | https://bugzilla.suse.com/1213054 | | | | https://www.suse.com/security/cve/CVE-2023-29550/ | | | | https://security-tracker.debian.org/tracker/CVE-2023-1999 | | | | https://secdb.alpinelinux.org/v3.17/main.yaml | | | | https://www.suse.com/security/cve/CVE-2023-29531/ | | | | https://www.suse.com/security/cve/CVE-2023-29541/ | | | | https://secdb.alpinelinux.org/edge/main.yaml | | | | https://www.debian.org/security/2023/dsa-5408 | | | | https://errata.rockylinux.org/RLSA-2023:2076 | | | | https://www.suse.com/security/cve/CVE-2023-29533/ | | | | https://www.debian.org/lts/security/2023/dla-3391 | | | | https://www.suse.com/security/cve/CVE-2023-1999.html | | | | https://www.debian.org/security/2023/dsa-5392 | | | | https://www.suse.com/security/cve/CVE-2023-0547/ | | | | https://ubuntu.com/security/notices/USN-6078-1 | | | | https://www.mozilla.org/en-US/security/advisories/mfsa2023-15/#CVE-2023-1999 | | | | https://access.redhat.com/errata/RHSA-2023:2078 | | | | https://www.auscert.org.au/bulletins/ESB-2023.2470 | | | | https://www.suse.com/security/cve/CVE-2023-29532/ | | | | https://www.suse.com/security/cve/CVE-2023-29542/ | | | | https://bugzilla.redhat.com/show_bug.cgi?id=2186102 | | | | https://www.auscert.org.au/bulletins/ESB-2023.3346 | | | | https://www.suse.com/support/update/announcement/2023/suse-su-20232467-1/ | | | | https://secdb.alpinelinux.org/v3.15/main.yaml | | | | https://vigilance.fr/vulnerability/libwebp-double-free-41265 | | | | https://errata.almalinux.org/9/ALSA-2023-2078.html | | | | https://www.suse.com/security/cve/CVE-2023-29536/ | | | | https://www.mozilla.org/en-US/security/advisories/mfsa2023-13/#CVE-2023-1999 | | | | https://www.suse.com/security/cve/CVE-2023-29479/ | | | | https://bugzilla.redhat.com/2186102 | | | | https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html | | | | https://www.suse.com/security/cve/CVE-2023-29545/ | | | | https://chromium.googlesource.com/webm/libwebp | | | | https://www.suse.com/security/cve/CVE-2023-29535/ | | | | https://www.suse.com/security/cve/CVE-2023-1945/ | | </details> 漏洞分析指导链接: https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md 漏洞数据来源: 其他 漏洞补丁信息: <details> <summary>详情(点击展开)</summary> | 影响的包 | 修复版本 | 修复补丁 | 问题引入补丁 | 来源 | | ------- | -------- | ------- | -------- | --------- | | webmproject/libwebp | | https://github.com/webmproject/libwebp/commit/a486d800b60d0af4cc0836bf7ed8f21e12974129.patch | | ljqc | </details> 二、漏洞分析结构反馈 影响性分析说明: There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free. openEuler评分: 7.5 Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 受影响版本排查(受影响/不受影响): 1.master(78.15.0):受影响 2.openEuler-20.03-LTS-SP4(78.4.0):受影响 3.openEuler-22.03-LTS-SP3:受影响 4.openEuler-22.03-LTS-SP4:受影响 5.openEuler-24.03-LTS(78.15.0):不受影响 6.openEuler-24.03-LTS-Next(78.15.0):不受影响 7.openEuler-24.03-LTS-SP1:不受影响 8.openEuler-24.03-LTS-SP2:不受影响 9.openEuler-24.03-LTS-SP3:不受影响 修复是否涉及abi变化(是/否): 1.master(78.15.0):否 2.openEuler-20.03-LTS-SP4(78.4.0):否 3.openEuler-22.03-LTS-SP3:否 4.openEuler-22.03-LTS-SP4:否 5.openEuler-24.03-LTS(78.15.0):否 6.openEuler-24.03-LTS-Next(78.15.0):否 7.openEuler-24.03-LTS-SP1:否 8.openEuler-24.03-LTS-SP2:否 9.openEuler-24.03-LTS-SP3:否 原因说明: 1.master(78.15.0):暂不修复-暂无解决方案或补丁 2.openEuler-20.03-LTS-SP4(78.4.0):暂不修复-暂无解决方案或补丁 3.openEuler-22.03-LTS-SP3:暂不修复-暂无解决方案或补丁 4.openEuler-22.03-LTS-SP4:暂不修复-暂无解决方案或补丁 5.openEuler-24.03-LTS(78.15.0):不受影响-漏洞代码不存在 6.openEuler-24.03-LTS-Next(78.15.0):不受影响-漏洞代码不存在 7.openEuler-24.03-LTS-SP1:不受影响-漏洞代码不存在 8.openEuler-24.03-LTS-SP2:不受影响-漏洞代码不存在 9.openEuler-24.03-LTS-SP3:不受影响-漏洞代码不存在
评论 (
4
)
登录
后才可以发表评论
状态
已挂起
待办的
已挂起
进行中
已完成
已拒绝
负责人
未设置
t.feng
t_feng
负责人
协作者
+负责人
+协作者
标签
CVE/UNFIXED
sig/Desktop
未设置
项目
未立项任务
未立项任务
里程碑
未关联里程碑
未关联里程碑
Pull Requests
未关联
未关联
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
未关联
分支 (
-
)
标签 (
-
)
开始日期   -   截止日期
-
置顶选项
不置顶
置顶等级:高
置顶等级:中
置顶等级:低
优先级
不指定
严重
主要
次要
不重要
预计工期
(小时)
参与者(3)
1
https://gitee.com/src-openeuler/mozjs78.git
git@gitee.com:src-openeuler/mozjs78.git
src-openeuler
mozjs78
mozjs78
点此查找更多帮助
搜索帮助
Git 命令在线学习
如何在 Gitee 导入 GitHub 仓库
Git 仓库基础操作
企业版和社区版功能对比
SSH 公钥设置
如何处理代码冲突
仓库体积过大,如何减小?
如何找回被删除的仓库数据
Gitee 产品配额说明
GitHub仓库快速导入Gitee及同步更新
什么是 Release(发行版)
将 PHP 项目自动发布到 packagist.org
评论
仓库举报
回到顶部
登录提示
该操作需登录 Gitee 帐号,请先登录后再操作。
立即登录
没有帐号,去注册