CVE-2015-8126

Publication date 12 November 2015

Last updated 24 July 2024


Ubuntu priority

Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.

Read the notes from the security team

Status

Package Ubuntu Release Status
chromium-browser 15.10 wily
Not affected
15.04 vivid
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise
Not affected
firefox 15.10 wily
Not affected
15.04 vivid
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise
Not affected
libpng 15.10 wily
Fixed 1.2.51-0ubuntu3.15.10.1
15.04 vivid
Fixed 1.2.51-0ubuntu3.15.04.1
14.04 LTS trusty
Fixed 1.2.50-1ubuntu2.14.04.1
12.04 LTS precise
Fixed 1.2.46-3ubuntu4.1
openjdk-6 15.10 wily
Not affected
15.04 vivid
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise
Not affected
openjdk-7 15.10 wily
Not affected
15.04 vivid
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise
Not affected
openjdk-8 15.10 wily
Not affected
15.04 vivid
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise Not in release
thunderbird 15.10 wily
Not affected
15.04 vivid
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise
Not affected

Notes


chriscoulson

upstream firefox doesn't use png_set_PLTE, see https://bugzilla.mozilla.org/show_bug.cgi?id=1224244#c0

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libpng