QID 356442

Date Published: 2023-10-31

QID 356442: Amazon Linux Security Advisory for thunderbird : ALAS2-2023-2291

Heap buffer overflow in webp in google chrome prior to 116.0.5845.187 allowed a remote attacker to perform an out of bounds memory write via a crafted html page. (
Chromium security severity: critical) (cve-2023-4863) with a specially crafted webp lossless file, libwebp may write data out of bounds to the heap. the readhuffmancodes() function allocates the huffmancode buffer with a size that comes from an array of precomputed sizes: ktablesize.
The color_cache_bits value defines which size to use. the ktablesize array only takes into account sizes for 8-bit first-level table lookups but not second-level table lookups.
Libwebp allows codes that are up to 15-bit (max_allowed_code_length).
When buildhuffmantable() attempts to fill the second-level tables it may write data out-of-bounds.
The oob write to the undersized array happens in replicatevalue. (
( CVE-2023-5129)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2023-2291 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356442

    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2023-2291 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2023-2291.html