CVE-2023-2618

NameCVE-2023-2618
DescriptionA vulnerability, which was classified as problematic, has been found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1035954

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
opencv (PTS)bullseye4.5.1+dfsg-5fixed
bookworm4.6.0+dfsg-12fixed
sid, trixie4.6.0+dfsg-14fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opencvsourcebuster(not affected)
opencvsourcebullseye(not affected)
opencvsource(unstable)4.6.0+dfsg-121035954

Notes

[bullseye] - opencv <not-affected> (Vulnerable code not present)
[buster] - opencv <not-affected> (Vulnerable code not present)
https://github.com/opencv/opencv_contrib/pull/3484
https://github.com/opencv/opencv_contrib/commit/2b62ff6181163eea029ed1cab11363b4996e9cd6

Search for package or bug name: Reporting problems