-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Package : opencv Version : 2.4.9.1+dfsg-1+deb8u2 CVE ID : CVE-2016-1516 CVE-2017-12597 CVE-2017-12598 CVE-2017-12599 CVE-2017-12601 CVE-2017-12603 CVE-2017-12604 CVE-2017-12605 CVE-2017-12606 CVE-2017-12862 CVE-2017-12863 CVE-2017-12864 CVE-2017-14136 CVE-2017-17760 CVE-2017-1000450 CVE-2018-5268 CVE-2018-5269
Early versions of opencv have problems while reading data, which might result in either buffer overflows, out-of bounds errors or integer overflows.
Further assertion errors might happen due to incorrect integer cast. For Debian 8 "Jessie", these problems have been fixed in version 2.4.9.1+dfsg-1+deb8u2. We recommend that you upgrade your opencv packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQJ8BAEBCgBmBQJbVF/BXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MjAxRkJGRkRCQkRFMDc4MjJFQUJCOTY5 NkZDQUMwRDM4N0I1ODQ3AAoJEJb8rA04e1hHu9EP/1uFEZvO8uMBHIPD0znbYvfQ JG9cK9d5lvw5h2qB6BHp/bMXLtncvhOC64TqzjIGmSiD9kBxMLt8dM/orSEmDUjJ CIJuWksSyc6iSnu3QSldPaSgqJHeeYW6LXOUhlb7DjiLv4TAtmW7w8QEp52GVzOB 9VUE5ohJ4Q5K+10SUId8Sy3cfnIqVnaTHz18K2YdM4L4/r9Mmo64nwlUSrlIaC3l XgtqV3LenSN64nTDF/vYyXYJ57ZCh3TW863Fo2BjujR4or41IxVU2Cue2HjVYzmU TskdUUC6S/46rZNb/WVjDK/D1kKAnPiZAzV3prvmA2zqXKCgfuVfDIj3iLoDYszC lqm5egFjWj77pVtWcJA06g6HNhE30YkjKcRXnVY4vo37Mnj29CUMfK+QMhqc8Caz gvOEX+pRlNa3bn2djeVt+6FG2y9BaTQZKRmLY6EFLD3CwUsGfuSmZdTY6iVNlbBT xXOBf9EtHpv4KeZwBJy/rDS8Rbab199/Kia75rPF+KTPl0uhdHSQQ/l2Yt4MTrX4 /VEBw89MVYf6dgXcm9U0jbC0GNWUHqqaFvfrny7iBILSWeN/TIcSw4wn/bWoq2Xe Q2Wh3r2Lz31OkeLesStiNa5XaFgxrLQzOMmRL9c0sxa+evqQ2Px+XUj2HHz3hcFS WlYC4YXevRjDXceNhob4 =CtOL -----END PGP SIGNATURE-----