[SECURITY] [DLA 1438-1] opencv security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : opencv
Version : 2.4.9.1+dfsg-1+deb8u2
CVE ID : CVE-2016-1516 CVE-2017-12597 CVE-2017-12598
CVE-2017-12599 CVE-2017-12601 CVE-2017-12603
CVE-2017-12604 CVE-2017-12605 CVE-2017-12606
CVE-2017-12862 CVE-2017-12863 CVE-2017-12864
CVE-2017-14136 CVE-2017-17760 CVE-2017-1000450
CVE-2018-5268 CVE-2018-5269
Early versions of opencv have problems while reading data, which might
result in either buffer overflows, out-of bounds errors or integer
overflows.
Further assertion errors might happen due to incorrect integer cast.
For Debian 8 "Jessie", these problems have been fixed in version
2.4.9.1+dfsg-1+deb8u2.
We recommend that you upgrade your opencv packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=CtOL
-----END PGP SIGNATURE-----
Reply to: