First published: Thu May 12 2016(Updated: )
Divide by zero vulnerability was found in function opj_tcd_init_tile in tcd.c Upstream patch: <a href="https://github.com/uclouvain/openjpeg/commit/8f9cc62b3f9a1da9712329ddcedb9750d585505c">https://github.com/uclouvain/openjpeg/commit/8f9cc62b3f9a1da9712329ddcedb9750d585505c</a> CVE request: <a href="http://seclists.org/oss-sec/2016/q2/327">http://seclists.org/oss-sec/2016/q2/327</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg | <=2.1.0 | |
Fedoraproject Fedora | =23 | |
Fedoraproject Fedora | =24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4797 is classified as a high severity vulnerability due to the potential for system crashes.
To mitigate CVE-2016-4797, update to the latest version of OpenJPEG that includes the upstream patch.
CVE-2016-4797 affects versions of OpenJPEG up to and including 2.1.0 and specific versions of Fedora.
CVE-2016-4797 can lead to application crashes, negatively impacting software stability and performance.
CVE-2016-4797 is caused by a divide-by-zero error in the opj_tcd_init_tile function within the OpenJPEG library.