opencv_3.2.0+dfsg-6_source.changes ACCEPTED into unstable
Debian FTP Masters
ftpmaster at ftp-master.debian.org
Tue Feb 12 13:07:15 GMT 2019
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 12 Feb 2019 12:26:31 +0100
Source: opencv
Architecture: source
Version: 3.2.0+dfsg-6
Distribution: unstable
Urgency: medium
Maintainer: Debian Science Team <debian-science-maintainers at lists.alioth.debian.org>
Changed-By: Mattia Rizzolo <mattia at debian.org>
Changes:
opencv (3.2.0+dfsg-6) unstable; urgency=medium
.
* Team upload.
.
[ Mattia Rizzolo ]
* Import security update from Ubuntu.
.
[ Nobuhiro Iwamatsu ]
* Change Vcs-Git and Vcs-Browser to salsa.
.
opencv (3.2.0+dfsg-5ubuntu1) disco; urgency=low
.
* Merge from Debian unstable. Remaining changes:
* SECURITY UPDATE: Out-of-bounds read/write errors and buffer
overflows in different functions.
- debian/patches/CVE-2017-several.patch: fix in bitstrm.cpp,
bitstrm.hpp, grfmt_bmp.cpp, grfmt_pxm.cpp, loadsave.cpp,
test_grfmt.cpp and cuda_test.cpp.
- CVE-2016-1516
- CVE-2016-1517
- CVE-2017-12597
- CVE-2017-12598
- CVE-2017-12599
- CVE-2017-12600
- CVE-2017-12601
- CVE-2017-12602
- CVE-2017-12603
- CVE-2017-12604
- CVE-2017-12605
- CVE-2017-12606
- CVE-2017-12862
- CVE-2017-12863
- CVE-2017-12864
* SECURITY UPDATE: Out of bound write cause segmentation fault
- debian/patches/CVE-2017-14136.patch: fix in grfmt_bmp.cpp,
grfmt_exr.cpp, grfmt_jpeg.cpp, grfmt_jpeg2000.cpp,
grfmt_pam.cpp, grfmt_sunras.cpp, utils.cpp and utils.hpp.
- CVE-2017-14136
* SECURITY UPDATE: Buffer Overflow in the cv::PxMDecoder::readData
function in grfmt_pxm.cpp
- debian/patches/CVE-2017-17760.patch: fix in grfmt_pxm.cpp.
- CVE-2017-17760
* SECURITY UPDATE: Integer overflow may lead to remote execution or
denial of service
- debian/patches/CVE-2017-1000450.patch: fix in grfmt_bmp.cpp.
- CVE-2017-1000450
* SECURITY UPDATE: A heap-based buffer overflow happens in
cv::Jpeg2KDecoder::readComponent8u when parsing a crafted image file
- debian/patches/CVE-2018-5268.patch: fix in grfmt_jpeg2000.cpp.
- CVE-2018-5268
* SECURITY UPDATE: an assertion failure happens in
cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because
of an incorrect integer cast.
- debian/patches/CVE-2018-5269.patch: add overflow checks.
- CVE-2018-5269
Checksums-Sha1:
15e277bc6e5a8c4c9ca02afbe1ec2a79ff54477c 5847 opencv_3.2.0+dfsg-6.dsc
be8a1abc41d5330162aac9e174fb54f2e40e6a0c 38760 opencv_3.2.0+dfsg-6.debian.tar.xz
6150b43d8be7fc9d18326f889ebbe9ef671a6dd6 47656 opencv_3.2.0+dfsg-6_amd64.buildinfo
Checksums-Sha256:
364f7c2196d8be003dca7ba1e3762e6100ccd69cc2b93542433a00504bc4cc45 5847 opencv_3.2.0+dfsg-6.dsc
5ca6024cc017ce635d6e0d376dad8d3539ea6692360981aeeb50be42018884ca 38760 opencv_3.2.0+dfsg-6.debian.tar.xz
84880a8a2d71a4748b9995223817c11a5d5d8ba0d5c9fe9445c5175829a5af9a 47656 opencv_3.2.0+dfsg-6_amd64.buildinfo
Files:
ac07262e9d37d78d5adc4d9f7c6f58d1 5847 devel optional opencv_3.2.0+dfsg-6.dsc
252f46fea71c88a3a13798415967cb6e 38760 devel optional opencv_3.2.0+dfsg-6.debian.tar.xz
48e6ebe68dfd322e98d5ec53e5c9274a 47656 devel optional opencv_3.2.0+dfsg-6_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=delV
-----END PGP SIGNATURE-----
Thank you for your contribution to Debian.
More information about the debian-science-maintainers
mailing list