Debian 10225 Published by

The following two security updates has been released for Debian GNU/Linux 7 LTS:

DLA 1353-1: wireshark security update
DLA 1354-1: opencv security update



DLA 1353-1: wireshark security update




Package : wireshark
Version : 1.12.1+g01b65bf-4+deb8u6~deb7u10
CVE ID : CVE-2018-7322 CVE-2018-7323 CVE-2018-7324 CVE-2018-7332
CVE-2018-7334 CVE-2018-7335 CVE-2018-7336 CVE-2018-7337
CVE-2018-7417 CVE-2018-7418 CVE-2018-7419 CVE-2018-7420


It was discovered that wireshark, a network protocol analyzer, contained
several vulnerabilities that could result in infinite loops in different
dissectors. Other issues are related to crash in dissectors that are
caused by special crafted and malformed packets.


For Debian 7 "Wheezy", these problems have been fixed in version
1.12.1+g01b65bf-4+deb8u6~deb7u10.

We recommend that you upgrade your wireshark packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



DLA 1354-1: opencv security update

Package : opencv
Version : 2.3.1-11+deb7u4
CVE ID : CVE-2018-5268 CVE-2018-5269
Debian Bug : 886674 886675

Two vulnerabilities were found in OpenCV, the "Open Computer Vision
Library".

CVE-2018-5268

In OpenCV 3.3.1, a heap-based buffer overflow happens in
cv::Jpeg2KDecoder::readComponent8u in
modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted
image file.

CVE-2018-5269

In OpenCV 3.3.1, an assertion failure happens in
cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp
because of an incorrect integer cast.

For Debian 7 "Wheezy", these problems have been fixed in version
2.3.1-11+deb7u4.

We recommend that you upgrade your opencv packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS