opencv_3.2.0+dfsg-6_source.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Tue Feb 12 13:07:15 GMT 2019



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 12 Feb 2019 12:26:31 +0100
Source: opencv
Architecture: source
Version: 3.2.0+dfsg-6
Distribution: unstable
Urgency: medium
Maintainer: Debian Science Team <debian-science-maintainers at lists.alioth.debian.org>
Changed-By: Mattia Rizzolo <mattia at debian.org>
Changes:
 opencv (3.2.0+dfsg-6) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Mattia Rizzolo ]
   * Import security update from Ubuntu.
 .
   [ Nobuhiro Iwamatsu ]
   * Change Vcs-Git and Vcs-Browser to salsa.
 .
 opencv (3.2.0+dfsg-5ubuntu1) disco; urgency=low
 .
   * Merge from Debian unstable.  Remaining changes:
   * SECURITY UPDATE: Out-of-bounds read/write errors and buffer
     overflows in different functions.
     - debian/patches/CVE-2017-several.patch: fix in bitstrm.cpp,
       bitstrm.hpp, grfmt_bmp.cpp, grfmt_pxm.cpp, loadsave.cpp,
       test_grfmt.cpp and cuda_test.cpp.
     - CVE-2016-1516
     - CVE-2016-1517
     - CVE-2017-12597
     - CVE-2017-12598
     - CVE-2017-12599
     - CVE-2017-12600
     - CVE-2017-12601
     - CVE-2017-12602
     - CVE-2017-12603
     - CVE-2017-12604
     - CVE-2017-12605
     - CVE-2017-12606
     - CVE-2017-12862
     - CVE-2017-12863
     - CVE-2017-12864
   * SECURITY UPDATE: Out of bound write cause segmentation fault
     - debian/patches/CVE-2017-14136.patch: fix in grfmt_bmp.cpp,
       grfmt_exr.cpp, grfmt_jpeg.cpp, grfmt_jpeg2000.cpp,
       grfmt_pam.cpp, grfmt_sunras.cpp, utils.cpp and utils.hpp.
     - CVE-2017-14136
   * SECURITY UPDATE: Buffer Overflow in the cv::PxMDecoder::readData
     function in grfmt_pxm.cpp
     - debian/patches/CVE-2017-17760.patch: fix in grfmt_pxm.cpp.
     - CVE-2017-17760
   * SECURITY UPDATE: Integer overflow may lead to remote execution or
     denial of service
     - debian/patches/CVE-2017-1000450.patch: fix in grfmt_bmp.cpp.
     - CVE-2017-1000450
   * SECURITY UPDATE: A heap-based buffer overflow happens in
     cv::Jpeg2KDecoder::readComponent8u when parsing a crafted image file
     - debian/patches/CVE-2018-5268.patch: fix in grfmt_jpeg2000.cpp.
     - CVE-2018-5268
   * SECURITY UPDATE: an assertion failure happens in
     cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because
     of an incorrect integer cast.
     - debian/patches/CVE-2018-5269.patch: add overflow checks.
     - CVE-2018-5269
Checksums-Sha1:
 15e277bc6e5a8c4c9ca02afbe1ec2a79ff54477c 5847 opencv_3.2.0+dfsg-6.dsc
 be8a1abc41d5330162aac9e174fb54f2e40e6a0c 38760 opencv_3.2.0+dfsg-6.debian.tar.xz
 6150b43d8be7fc9d18326f889ebbe9ef671a6dd6 47656 opencv_3.2.0+dfsg-6_amd64.buildinfo
Checksums-Sha256:
 364f7c2196d8be003dca7ba1e3762e6100ccd69cc2b93542433a00504bc4cc45 5847 opencv_3.2.0+dfsg-6.dsc
 5ca6024cc017ce635d6e0d376dad8d3539ea6692360981aeeb50be42018884ca 38760 opencv_3.2.0+dfsg-6.debian.tar.xz
 84880a8a2d71a4748b9995223817c11a5d5d8ba0d5c9fe9445c5175829a5af9a 47656 opencv_3.2.0+dfsg-6_amd64.buildinfo
Files:
 ac07262e9d37d78d5adc4d9f7c6f58d1 5847 devel optional opencv_3.2.0+dfsg-6.dsc
 252f46fea71c88a3a13798415967cb6e 38760 devel optional opencv_3.2.0+dfsg-6.debian.tar.xz
 48e6ebe68dfd322e98d5ec53e5c9274a 47656 devel optional opencv_3.2.0+dfsg-6_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=delV
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the debian-science-maintainers mailing list