Bug 875071 (CVE-2012-5127) - CVE-2012-5127 libwebp: Integer overflow when processing crafted WebP image
Summary: CVE-2012-5127 libwebp: Integer overflow when processing crafted WebP image
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2012-5127
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 875072
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-11-09 13:03 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:57 UTC (History)
2 users (show)

Fixed In Version: libwebp 0.2.1
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-01-20 20:29:53 UTC


Attachments (Terms of Use)
Backported patch from particular Debian bug entry (2.78 KB, patch)
2013-04-03 11:05 UTC, Jan Lieskovsky
no flags Details | Diff


Links
System ID Priority Status Summary Last Updated
Debian BTS 704573 None None None Never

Description Jan Lieskovsky 2012-11-09 13:03:47 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2012-5127 to the following vulnerability:

Integer overflow in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted WebP image.

References:
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5127
[2] http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html
[3] https://code.google.com/p/chromium/issues/detail?id=157079
[4] https://bugs.gentoo.org/show_bug.cgi?id=442152
[5] https://bugs.gentoo.org/show_bug.cgi?id=442096
[6] https://groups.google.com/a/webmproject.org/forum/?fromgroups=#!topic/webp-discuss/QTtgi8YfgkE

Comment 1 Jan Lieskovsky 2012-11-09 13:05:40 UTC
Created libwebp tracking bugs for this issue

Affects: fedora-all [bug 875072]

Comment 2 Jan Lieskovsky 2013-04-03 11:05:41 UTC
Created attachment 731108 [details]
Backported patch from particular Debian bug entry


Note You need to log in before you can comment on or make changes to this bug.