CVE-2015-8126
Publication date 12 November 2015
Last updated 24 July 2024
Ubuntu priority
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
Status
Package | Ubuntu Release | Status |
---|---|---|
chromium-browser | ||
14.04 LTS trusty | Not in release | |
firefox | ||
14.04 LTS trusty | Not in release | |
libpng | ||
14.04 LTS trusty |
Fixed 1.2.50-1ubuntu2.14.04.1
|
|
openjdk-6 | ||
14.04 LTS trusty | Not in release | |
openjdk-7 | ||
14.04 LTS trusty | Not in release | |
openjdk-8 | ||
14.04 LTS trusty | Not in release | |
thunderbird | ||
14.04 LTS trusty | Not in release | |
Notes
chriscoulson
upstream firefox doesn't use png_set_PLTE, see https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0
References
Related Ubuntu Security Notices (USN)
- USN-2815-1
- libpng vulnerabilities
- 19 November 2015