CVE-2015-1273

Priority
Description
Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in
PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to
cause a denial of service or possibly have unspecified other impact via
invalid JPEG2000 data in a PDF document.
Notes
tyhicksThere are large changes between openjpeg trunk and the 1.5 and 1.3
branches that we shipped in Vivid and older. However, it looks like those
code bases are also affected because I don't see similar sanity checks. As of
2015-07-24, I don't see a fix in the 1.5 branch.
Package
Upstream:released (44.0.2403.89)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was ignored)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [44.0.2403.89-0ubuntu0.14.04.1.1095])
Ubuntu 16.04 LTS (Xenial Xerus):released (44.0.2403.89-0ubuntu1.1195)
Ubuntu 18.04 LTS (Bionic Beaver):released (44.0.2403.89-0ubuntu1.1195)
Ubuntu 19.10 (Eoan Ermine):released (44.0.2403.89-0ubuntu1.1195)
Ubuntu 20.04 LTS (Focal Fossa):released (44.0.2403.89-0ubuntu1.1195)
Ubuntu 20.10 (Groovy Gorilla):released (44.0.2403.89-0ubuntu1.1195)
Patches:
Upstream:https://pdfium.googlesource.com/pdfium/+/cddfde0cddbc8467e0d5fa04c30405ee257750fc
Package
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was deferred [2015-07-24])
Ubuntu 14.04 ESM (Trusty Tahr):deferred (2015-07-24)
Ubuntu 16.04 LTS (Xenial Xerus):deferred (2015-07-24)
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Patches:
Upstream:https://github.com/uclouvain/openjpeg/commit/daed8cc9195555e101ab708a501af2dfe6d5e001
Package
Upstream:not-affected
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
More Information

Updated: 2020-05-07 18:23:22 UTC (commit 3db3e0dddc92f0ed79599b5949ba82bc7a3031ed)