Source: opencv X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security
Hi, The following vulnerabilities were published for opencv. CVE-2023-2617[0]: | A vulnerability classified as problematic was found in OpenCV | wechat_qrcode Module up to 4.7.0. Affected by this vulnerability is | the function DecodedBitStreamParser::decodeByteSegment of the file | qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads | to null pointer dereference. The attack can be launched remotely. The | exploit has been disclosed to the public and may be used. It is | recommended to apply a patch to fix this issue. The associated | identifier of this vulnerability is VDB-228547. https://github.com/opencv/opencv_contrib/pull/3480 https://github.com/opencv/opencv_contrib/commit/ccc277247ac1a7aef0a90353edcdec35fbc5903c CVE-2023-2618[1]: | A vulnerability, which was classified as problematic, has been found | in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is | the function DecodedBitStreamParser::decodeHanziSegment of the file | qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads | to memory leak. The attack may be launched remotely. The name of the | patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended | to apply a patch to fix this issue. The identifier of this | vulnerability is VDB-228548. https://github.com/opencv/opencv_contrib/pull/3484 https://github.com/opencv/opencv_contrib/commit/2b62ff6181163eea029ed1cab11363b4996e9cd6 If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-2617 https://www.cve.org/CVERecord?id=CVE-2023-2617 [1] https://security-tracker.debian.org/tracker/CVE-2023-2618 https://www.cve.org/CVERecord?id=CVE-2023-2618 Please adjust the affected versions in the BTS as needed.