Bug#1035954: opencv: CVE-2023-2617 CVE-2023-2618
Moritz Mühlenhoff
jmm at inutil.org
Thu May 11 16:44:00 BST 2023
Source: opencv
X-Debbugs-CC: team at security.debian.org
Severity: normal
Tags: security
Hi,
The following vulnerabilities were published for opencv.
CVE-2023-2617[0]:
| A vulnerability classified as problematic was found in OpenCV
| wechat_qrcode Module up to 4.7.0. Affected by this vulnerability is
| the function DecodedBitStreamParser::decodeByteSegment of the file
| qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads
| to null pointer dereference. The attack can be launched remotely. The
| exploit has been disclosed to the public and may be used. It is
| recommended to apply a patch to fix this issue. The associated
| identifier of this vulnerability is VDB-228547.
https://github.com/opencv/opencv_contrib/pull/3480
https://github.com/opencv/opencv_contrib/commit/ccc277247ac1a7aef0a90353edcdec35fbc5903c
CVE-2023-2618[1]:
| A vulnerability, which was classified as problematic, has been found
| in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is
| the function DecodedBitStreamParser::decodeHanziSegment of the file
| qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads
| to memory leak. The attack may be launched remotely. The name of the
| patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended
| to apply a patch to fix this issue. The identifier of this
| vulnerability is VDB-228548.
https://github.com/opencv/opencv_contrib/pull/3484
https://github.com/opencv/opencv_contrib/commit/2b62ff6181163eea029ed1cab11363b4996e9cd6
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2023-2617
https://www.cve.org/CVERecord?id=CVE-2023-2617
[1] https://security-tracker.debian.org/tracker/CVE-2023-2618
https://www.cve.org/CVERecord?id=CVE-2023-2618
Please adjust the affected versions in the BTS as needed.
More information about the debian-science-maintainers
mailing list