First published: Thu May 12 2016(Updated: )
Divide by zero vulnerability was found in function opj_tcd_init_tile in tcd.c Upstream patch: <a href="https://github.com/uclouvain/openjpeg/commit/8f9cc62b3f9a1da9712329ddcedb9750d585505c">https://github.com/uclouvain/openjpeg/commit/8f9cc62b3f9a1da9712329ddcedb9750d585505c</a> CVE request: <a href="http://seclists.org/oss-sec/2016/q2/327">http://seclists.org/oss-sec/2016/q2/327</a>
Affected Software | Affected Version | How to fix |
---|---|---|
uclouvain openjpeg |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1335483 is classified as high due to the potential for a divide by zero vulnerability that can lead to application crashes or undefined behavior.
To fix REDHAT-BUG-1335483, apply the upstream patch available from the OpenJPEG repository addressing the divide by zero issue.
REDHAT-BUG-1335483 affects the UCLouvain OpenJPEG software package.
The nature of the vulnerability in REDHAT-BUG-1335483 is a divide by zero error in the function opj_tcd_init_tile.
REDHAT-BUG-1335483 was reported as a bug in 2016 that highlights a critical vulnerability in the handling of image processing.