{"id":"UBUNTU-CVE-2014-7947","details":"OpenJPEG before r2944, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, pi.c, t1.c, t2.c, and tcd.c.","modified":"2025-10-24T04:45:13Z","published":"2015-01-22T22:59:00Z","upstream":["CVE-2014-7947"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-7947"},{"type":"REPORT","url":"https://pdfium.googlesource.com/pdfium/+/66d6538c0a97cff550cafdfeaebe8a3f0efbad89"},{"type":"REPORT","url":"https://code.google.com/p/chromium/issues/detail?id=430566"},{"type":"REPORT","url":"http://googlechromereleases.blogspot.com/2015/01/stable-update.html"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-7947"}],"affected":[{"package":{"name":"chromium-browser","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/chromium-browser@40.0.2214.94-0ubuntu0.14.04.1.1068?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"40.0.2214.94-0ubuntu0.14.04.1.1068"}]}],"versions":["29.0.1547.65-0ubuntu2","31.0.1650.63-0ubuntu1~20131204.1","32.0.1700.107-0ubuntu1~20140204.977.1","33.0.1750.152-0ubuntu1~pkg995.1","34.0.1847.116-0ubuntu2","36.0.1985.125-0ubuntu1.14.04.0~pkg1029","37.0.2062.94-0ubuntu0.14.04.1~pkg1042","37.0.2062.120-0ubuntu0.14.04.1~pkg1049","38.0.2125.111-0ubuntu0.14.04.1.1061","39.0.2171.65-0ubuntu0.14.04.1.1064"],"ecosystem_specific":{"binaries":[{"binary_version":"40.0.2214.94-0ubuntu0.14.04.1.1068","binary_name":"chromium-browser"},{"binary_version":"40.0.2214.94-0ubuntu0.14.04.1.1068","binary_name":"chromium-browser-l10n"},{"binary_version":"40.0.2214.94-0ubuntu0.14.04.1.1068","binary_name":"chromium-chromedriver"},{"binary_version":"40.0.2214.94-0ubuntu0.14.04.1.1068","binary_name":"chromium-codecs-ffmpeg"},{"binary_version":"40.0.2214.94-0ubuntu0.14.04.1.1068","binary_name":"chromium-codecs-ffmpeg-extra"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-7947.json"}},{"package":{"name":"openjpeg2","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/openjpeg2@2.1.2-1.1+deb9u2build0.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.2-1.1+deb9u2build0.1"}]}],"versions":["2.1.0-2.1","2.1.0-2.1ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.1.2-1.1+deb9u2build0.1","binary_name":"libopenjp2-7"},{"binary_version":"2.1.2-1.1+deb9u2build0.1","binary_name":"libopenjp2-7-dev"},{"binary_version":"2.1.2-1.1+deb9u2build0.1","binary_name":"libopenjp2-tools"},{"binary_version":"2.1.2-1.1+deb9u2build0.1","binary_name":"libopenjp3d-tools"},{"binary_version":"2.1.2-1.1+deb9u2build0.1","binary_name":"libopenjp3d7"},{"binary_version":"2.1.2-1.1+deb9u2build0.1","binary_name":"libopenjpip-dec-server"},{"binary_version":"2.1.2-1.1+deb9u2build0.1","binary_name":"libopenjpip-server"},{"binary_version":"2.1.2-1.1+deb9u2build0.1","binary_name":"libopenjpip-viewer"},{"binary_version":"2.1.2-1.1+deb9u2build0.1","binary_name":"libopenjpip7"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-7947.json"}},{"package":{"name":"vxl","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/vxl@1.17.0.dfsg2-4?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.17.0.dfsg2-1","1.17.0.dfsg2-2","1.17.0.dfsg2-3","1.17.0.dfsg2-4"],"ecosystem_specific":{"binaries":[{"binary_version":"1.17.0.dfsg2-4","binary_name":"libvxl1-dev"},{"binary_version":"1.17.0.dfsg2-4","binary_name":"libvxl1.17v5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-7947.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}