All of lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH 1/1] package/opencv3: security bump to version 3.4.9
@ 2020-01-11 16:02 Fabrice Fontaine
  2020-01-11 21:39 ` Peter Korsgaard
  2020-01-12 10:55 ` Peter Korsgaard
  0 siblings, 2 replies; 3+ messages in thread
From: Fabrice Fontaine @ 2020-01-11 16:02 UTC (permalink / raw)
  To: buildroot

- Fix CVE-2019-14491: An issue was discovered in OpenCV before 3.4.7
  and 4.x before 4.1.1. There is an out of bounds read in the function
  cv::predictOrdered<cv::HaarEvaluator> in
  modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
- Fix CVE-2019-14492: An issue was discovered in OpenCV before 3.4.7
  and 4.x before 4.1.1. There is an out of bounds read/write in the
  function HaarEvaluator::OptFeature::calc in
  modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
- atomic workaround is not needed since version 3.4.8 and
  https://github.com/opencv/opencv/commit/464972855e25f71667009b8fe88092d11aab0297
- Update hash of license file (Xperience.AI added:
  https://github.com/opencv/opencv/commit/766465ce9483c20d54bfce422d285c077f6502bd)

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
---
 package/opencv3/opencv3.hash | 4 ++--
 package/opencv3/opencv3.mk   | 7 +------
 2 files changed, 3 insertions(+), 8 deletions(-)

diff --git a/package/opencv3/opencv3.hash b/package/opencv3/opencv3.hash
index 0b88b52da5..4953d01a1c 100644
--- a/package/opencv3/opencv3.hash
+++ b/package/opencv3/opencv3.hash
@@ -1,3 +1,3 @@
 # Locally calculated
-sha256 e7d311ff97f376b8ee85112e2b536dbf4bdf1233673500175ed7cf21a0089f6d  opencv3-3.4.6.tar.gz
-sha256 488b640f88bc72a1f9bbb985bde8352ed8826b863f0b3e14f7038c44bf95d6bc  LICENSE
+sha256 b7ea364de7273cfb3b771a0d9c111b8b8dfb42ff2bcd2d84681902fb8f49892a  opencv3-3.4.9.tar.gz
+sha256 c3596f2f886631ac49af2c9a201ca559f850bb5726bdc25eacbe2369a70caad9  LICENSE
diff --git a/package/opencv3/opencv3.mk b/package/opencv3/opencv3.mk
index bac4c2fa11..89ed8f4278 100644
--- a/package/opencv3/opencv3.mk
+++ b/package/opencv3/opencv3.mk
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-OPENCV3_VERSION = 3.4.6
+OPENCV3_VERSION = 3.4.9
 OPENCV3_SITE = $(call github,opencv,opencv,$(OPENCV3_VERSION))
 OPENCV3_INSTALL_STAGING = YES
 OPENCV3_LICENSE = BSD-3-Clause
@@ -13,11 +13,6 @@ OPENCV3_SUPPORTS_IN_SOURCE_BUILD = NO
 
 OPENCV3_CXXFLAGS = $(TARGET_CXXFLAGS)
 
-# Uses __atomic_fetch_add_4
-ifeq ($(BR2_TOOLCHAIN_HAS_LIBATOMIC),y)
-OPENCV3_CXXFLAGS += -latomic
-endif
-
 # Fix c++11 build with missing std::exception_ptr
 ifeq ($(BR2_TOOLCHAIN_HAS_GCC_BUG_64735),y)
 OPENCV3_CXXFLAGS += -DCV__EXCEPTION_PTR=0
-- 
2.24.1

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* [Buildroot] [PATCH 1/1] package/opencv3: security bump to version 3.4.9
  2020-01-11 16:02 [Buildroot] [PATCH 1/1] package/opencv3: security bump to version 3.4.9 Fabrice Fontaine
@ 2020-01-11 21:39 ` Peter Korsgaard
  2020-01-12 10:55 ` Peter Korsgaard
  1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2020-01-11 21:39 UTC (permalink / raw)
  To: buildroot

>>>>> "Fabrice" == Fabrice Fontaine <fontaine.fabrice@gmail.com> writes:

 > - Fix CVE-2019-14491: An issue was discovered in OpenCV before 3.4.7
 >   and 4.x before 4.1.1. There is an out of bounds read in the function
 >   cv::predictOrdered<cv::HaarEvaluator> in
 >   modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
 > - Fix CVE-2019-14492: An issue was discovered in OpenCV before 3.4.7
 >   and 4.x before 4.1.1. There is an out of bounds read/write in the
 >   function HaarEvaluator::OptFeature::calc in
 >   modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
 > - atomic workaround is not needed since version 3.4.8 and
 >   https://github.com/opencv/opencv/commit/464972855e25f71667009b8fe88092d11aab0297
 > - Update hash of license file (Xperience.AI added:
 >   https://github.com/opencv/opencv/commit/766465ce9483c20d54bfce422d285c077f6502bd)

 > Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>

Committed, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Buildroot] [PATCH 1/1] package/opencv3: security bump to version 3.4.9
  2020-01-11 16:02 [Buildroot] [PATCH 1/1] package/opencv3: security bump to version 3.4.9 Fabrice Fontaine
  2020-01-11 21:39 ` Peter Korsgaard
@ 2020-01-12 10:55 ` Peter Korsgaard
  1 sibling, 0 replies; 3+ messages in thread
From: Peter Korsgaard @ 2020-01-12 10:55 UTC (permalink / raw)
  To: buildroot

>>>>> "Fabrice" == Fabrice Fontaine <fontaine.fabrice@gmail.com> writes:

 > - Fix CVE-2019-14491: An issue was discovered in OpenCV before 3.4.7
 >   and 4.x before 4.1.1. There is an out of bounds read in the function
 >   cv::predictOrdered<cv::HaarEvaluator> in
 >   modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
 > - Fix CVE-2019-14492: An issue was discovered in OpenCV before 3.4.7
 >   and 4.x before 4.1.1. There is an out of bounds read/write in the
 >   function HaarEvaluator::OptFeature::calc in
 >   modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
 > - atomic workaround is not needed since version 3.4.8 and
 >   https://github.com/opencv/opencv/commit/464972855e25f71667009b8fe88092d11aab0297
 > - Update hash of license file (Xperience.AI added:
 >   https://github.com/opencv/opencv/commit/766465ce9483c20d54bfce422d285c077f6502bd)

 > Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>

Committed to 2019.02.x and 2019.11.x, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2020-01-12 10:55 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-01-11 16:02 [Buildroot] [PATCH 1/1] package/opencv3: security bump to version 3.4.9 Fabrice Fontaine
2020-01-11 21:39 ` Peter Korsgaard
2020-01-12 10:55 ` Peter Korsgaard

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.