CVE-2015-1273
Publication date 23 July 2015
Last updated 24 July 2024
Ubuntu priority
Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid JPEG2000 data in a PDF document.
Status
Package | Ubuntu Release | Status |
---|---|---|
chromium-browser | 24.10 oracular |
Fixed 44.0.2403.89-0ubuntu1.1195
|
24.04 LTS noble |
Fixed 44.0.2403.89-0ubuntu1.1195
|
|
22.04 LTS jammy |
Fixed 44.0.2403.89-0ubuntu1.1195
|
|
20.04 LTS focal |
Fixed 44.0.2403.89-0ubuntu1.1195
|
|
18.04 LTS bionic |
Fixed 44.0.2403.89-0ubuntu1.1195
|
|
16.04 LTS xenial |
Fixed 44.0.2403.89-0ubuntu1.1195
|
|
14.04 LTS trusty |
Fixed 44.0.2403.89-0ubuntu0.14.04.1.1095
|
|
openjpeg | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Vulnerable, fix deferred
|
|
14.04 LTS trusty |
Vulnerable, fix deferred
|
|
oxide-qt | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
Notes
tyhicks
There are large changes between openjpeg trunk and the 1.5 and 1.3 branches that we shipped in Vivid and older. However, it looks like those code bases are also affected because I don't see similar sanity checks. As of 2015-07-24, I don't see a fix in the 1.5 branch.