CVE-2019-5064

NameCVE-2019-5064
DescriptionAn exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, before version 4.2.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs948180

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
opencv (PTS)bullseye4.5.1+dfsg-5fixed
bookworm4.6.0+dfsg-12fixed
sid, trixie4.6.0+dfsg-14fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opencvsourceexperimental4.2.0+dfsg-1
opencvsourcejessie(not affected)
opencvsourcestretch(not affected)
opencvsourcebuster(not affected)
opencvsource(unstable)4.2.0+dfsg-3948180

Notes

[buster] - opencv <not-affected> (Vulnerable code introduced later)
[stretch] - opencv <not-affected> (Vulnerable code introduced later)
[jessie] - opencv <not-affected> (The vulnerable code was introduced later)
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853
Fixed by: https://github.com/opencv/opencv/commit/f42d5399aac80d371b17d689851406669c9b9111 (4.2.0)
https://github.com/opencv/opencv/issues/15857
Persistence implementation refactored in: https://github.com/opencv/opencv/pull/13011

Search for package or bug name: Reporting problems