Control: severity important
Control: tags -1 + upstream
Adjusting severity, got wrong before sending bug.
Regards,
Salvatore
--
debian-science-maintainers mailing list
debian-science-maintainers@lists.alioth.debian.org
Source: opencv
Version: 3.2.0+dfsg-1
Severity: grave
Tags: security
Forwarded: https://github.com/opencv/opencv/issues/10541
Hi,
the following vulnerability was published for opencv, please
double-check.
CVE-2018-5268[0]:
| In OpenCV 3.3.1, a heap-based buffer overflow happens in
|
Source: opencv
Version: 3.2.0+dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/opencv/opencv/issues/10540
Hi,
the following vulnerability was published for opencv.
CVE-2018-5269[0]:
| In OpenCV 3.3.1, an assertion failure happens in
| cv::RBaseStream::setPos in
Source: opencv
Version: 2.4.9.1+dfsg1-1
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/opencv/opencv/issues/9723
Hi,
the following vulnerability was published for opencv.
CVE-2017-1000450[0]:
| In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor
Source: opencv
Version: 3.2.0+dfsg-4
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/opencv/opencv/issues/10351
Hi,
the following vulnerability was published for opencv.
CVE-2017-17760[0]:
| OpenCV 3.3.1 has a Buffer Overflow in the cv::PxMDecoder::readData
|
Source: opencv
Version: 2.4.9.1+dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/opencv/opencv/issues/9372
Hi,
the following vulnerability was published for opencv.
CVE-2017-12864[0]:
| In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did
| not
Source: opencv
Version: 2.4.9.1+dfsg-1
Severity: important
Tags: upstream security
Forwarded: https://github.com/opencv/opencv/issues/9371
Hi,
the following vulnerability was published for opencv.
CVE-2017-12863[0]:
| In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function
|
Control: retitle -1 opencv: CVE-2016-1516 CVE-2016-1517
On Sun, Aug 13, 2017 at 08:39:14PM +0200, Salvatore Bonaccorso wrote:
> Source: opencv
> Version: 2.4.9.1+dfsg1-2
> Severity: important
> Tags: upstream security
> Forwarded: https://github.com/opencv/opencv/issu
Source: opencv
Version: 2.4.9.1+dfsg1-2
Severity: important
Tags: security upstream
Forwarded: https://github.com/opencv/opencv/issues/9311
Hi,
the following vulnerabilities were published for opencv.
CVE-2017-12600[0]:
| OpenCV (Open Source Computer Vision Library) through 3.3 has a denial
|
Source: opencv
Version: 2.4.9.1+dfsg1-2
Severity: important
Tags: upstream security
Forwarded: https://github.com/opencv/opencv/issues/9309
Hi,
the following vulnerabilities were published for opencv. I'm still not
filling them as individual bugs, since all are tracked in the upstream
report at
Hi
On Fri, Jun 16, 2017 at 09:44:00PM +0200, Anton Gladky wrote:
> found 864901 4.6.6-2
> found 864901 4.6.0-8
Hmm, sure? See the linked analysis in the SuSE Bugzilla.
Regards,
Salvatore
--
debian-science-maintainers mailing list
debian-science-maintainers@lists.alioth.debian.org
Source: gnuplot
Version: 5.0.5+dfsg1-6
Severity: important
Tags: patch security upstream
Forwarded: https://sourceforge.net/p/gnuplot/bugs/1933/
Hi,
the following vulnerability was published for gnuplot.
CVE-2017-9670[0]:
| An uninitialized stack variable vulnerability in load_tic_series() in
|
Hi,
On Tue, Oct 11, 2016 at 07:20:47PM +, Ghislain Antony Vaillant wrote:
>[ Ghislain Antony Vaillant ]
>* Fix CVE-2016-5864: apply patch from wheezy-security.
> Thanks to Salvatore Bonaccorso, Balint Reczey and Chris Lamb
> (Closes: #839827)
There is a typo i
Hi Daniel,
On Thu, Oct 08, 2015 at 01:05:30PM +0200, Daniel Stender wrote:
> On 08.10.2015 13:00, Salvatore Bonaccorso wrote:
> > Hello Daniel,
> >
> > On Thu, Oct 08, 2015 at 12:20:27PM +0200, Daniel Stender wrote:
> >> Hello,
> >>
> >> there was
Hi Pierre,
On Wed, Sep 03, 2014 at 11:27:02AM +0200, Pierre Saramito wrote:
Dear all,
The RC bug #748130 founded in the scotch library
causes to mark for autoremoval many packages in the jessie distribution.
Notice that the bug do not concern the actual jessie distribution :
it is
15 matches
Mail list logo