Article 6F3DK Google quietly corrects previously submitted disclosure for critical webp 0-day

Google quietly corrects previously submitted disclosure for critical webp 0-day

by
Dan Goodin
from Ars Technica - All content on (#6F3DK)
exploit-vulnerability-security-1-800x450

Enlarge (credit: Getty Images)

Google has quietly resubmitted a disclosure of a critical code-execution vulnerability affecting thousands of individual apps and software frameworks after its previous submission left readers with the mistaken impression that the threat affected only the Chrome browser.

The vulnerability originates in the libwebp code library, which Google created in 2010 for rendering images in webp, a then-new format that resulted in files that were up to 26 percent smaller than PNG images. Libwebp is incorporated into just about every app, operating system, or other code library that renders webp images, most notably the Electron framework used in Chrome and many other apps that run on both desktop and mobile devices.

Two weeks ago, Google issued a security advisory for what it said was a heap buffer overflow in WebP in Chrome. Google's formal description, tracked as CVE-2023-4863, scoped the affected vendor as Google" and the software affected as Chrome," even though any code that used libwebp was vulnerable. Critics warned that Google's failure to note that thousands of other pieces of code were also vulnerable would result in unnecessary delays in patching the vulnerability, which allows attackers to execute malicious code when users do nothing more than view a booby-trapped webp image.

Read 5 remaining paragraphs | Comments

External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments