openSUSE: 2019:2671-1: moderate: opencv

    Date 11 Dec 2019
    337
    Posted By LinuxSecurity Advisories
    An update that solves three vulnerabilities and has one errata is now available.
       openSUSE Security Update: Security update for opencv
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2019:2671-1
    Rating:             moderate
    References:         #1144348 #1144352 #1149742 #1154091 
    Cross-References:   CVE-2019-14491 CVE-2019-14492 CVE-2019-15939
                       
    Affected Products:
                        openSUSE Leap 15.1
    ______________________________________________________________________________
    
       An update that solves three vulnerabilities and has one
       errata is now available.
    
    Description:
    
       This update for opencv fixes the following issues:
    
       Security issues fixed:
    
       - CVE-2019-14491: Fixed an out of bounds read in the function
         cv:predictOrdered, leading to DOS (bsc#1144352).
       - CVE-2019-14492: Fixed an out of bounds read/write in the function
         HaarEvaluator:OptFeature:calc, which leads to denial of service
         (bsc#1144348).
       - CVE-2019-15939: Fixed a divide-by-zero error in
         cv:HOGDescriptor:getDescriptorSize (bsc#1149742).
    
       Non-security issue fixed:
    
       - Fixed an issue in opencv-devel that broke builds with "No rule to make
         target opencv_calib3d-NOTFOUND" (bsc#1154091).
    
       This update was imported from the SUSE:SLE-15:Update update project.
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 15.1:
    
          zypper in -t patch openSUSE-2019-2671=1
    
    
    
    Package List:
    
       - openSUSE Leap 15.1 (x86_64):
    
          libopencv3_3-3.3.1-lp151.6.3.1
          libopencv3_3-debuginfo-3.3.1-lp151.6.3.1
          opencv-3.3.1-lp151.6.3.1
          opencv-debuginfo-3.3.1-lp151.6.3.1
          opencv-debugsource-3.3.1-lp151.6.3.1
          opencv-devel-3.3.1-lp151.6.3.1
          opencv-doc-3.3.1-lp151.6.3.1
          python2-opencv-3.3.1-lp151.6.3.1
          python2-opencv-debuginfo-3.3.1-lp151.6.3.1
          python3-opencv-3.3.1-lp151.6.3.1
          python3-opencv-debuginfo-3.3.1-lp151.6.3.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2019-14491.html
       https://www.suse.com/security/cve/CVE-2019-14492.html
       https://www.suse.com/security/cve/CVE-2019-15939.html
       https://bugzilla.suse.com/1144348
       https://bugzilla.suse.com/1144352
       https://bugzilla.suse.com/1149742
       https://bugzilla.suse.com/1154091
    
    -- 
    

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/36-have-you-ever-used-tcpdump-for-network-troubleshooting-or-debugging?task=poll.vote&format=json
    36
    radio
    [{"id":"125","title":"Yes","votes":"36","type":"x","order":"1","pct":80,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":20,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.