Bug 875071 (CVE-2012-5127)

Summary: CVE-2012-5127 libwebp: Integer overflow when processing crafted WebP image
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED CURRENTRELEASE QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: metherid, rdieter
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libwebp 0.2.1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-01-20 20:29:53 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 875072    
Bug Blocks:    
Attachments:
Description Flags
Backported patch from particular Debian bug entry none

Description Jan Lieskovsky 2012-11-09 13:03:47 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2012-5127 to the following vulnerability:

Integer overflow in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted WebP image.

References:
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5127
[2] http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html
[3] https://code.google.com/p/chromium/issues/detail?id=157079
[4] https://bugs.gentoo.org/show_bug.cgi?id=442152
[5] https://bugs.gentoo.org/show_bug.cgi?id=442096
[6] https://groups.google.com/a/webmproject.org/forum/?fromgroups=#!topic/webp-discuss/QTtgi8YfgkE

Comment 1 Jan Lieskovsky 2012-11-09 13:05:40 UTC
Created libwebp tracking bugs for this issue

Affects: fedora-all [bug 875072]

Comment 2 Jan Lieskovsky 2013-04-03 11:05:41 UTC
Created attachment 731108 [details]
Backported patch from particular Debian bug entry