This site requires JavaScript to be enabled to function correctly, please enable it.
Summary:
CVE-2018-20845 openjpeg: division-by-zero in functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c
Product:
[Other] Security Response
Reporter:
Dhananjay Arunesh <darunesh>
Component:
vulnerability Assignee:
Red Hat Product Security <security-response-team>
Status:
CLOSED
ERRATA
QA Contact:
Severity:
low
Docs Contact:
Priority:
low
Version:
unspecified CC:
extras-orphan, fedora, jaromir.capik, jjoyce, jschluet, lhh, lpeer, manisandro, mburns, nforro, oliver, rdieter, sclewis, slinaber
Target Milestone:
--- Keywords:
Reopened, Security
Target Release:
---
Hardware:
All
OS:
Linux
Whiteboard:
Fixed In Version:
openjpeg 2.3.1
Doc Type:
If docs needed, set a value
Doc Text:
Story Points:
---
Clone Of:
Environment:
Last Closed:
2021-10-27 10:46:09 UTC
Type:
---
Regression:
---
Mount Type:
---
Documentation:
---
CRM:
Verified Versions:
Category:
---
oVirt Team:
---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team:
---
Target Upstream Version:
Embargoed:
Bug Depends On:
1728507 , 1728508 , 1730678 , 1730679
Bug Blocks:
1728516