{"id":"CVE-2023-2618","details":"A vulnerability, which was classified as problematic, has been found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548.","modified":"2026-03-13T07:30:35.496087Z","published":"2023-05-10T06:15:17.577Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.228548"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.228548"},{"type":"FIX","url":"https://github.com/opencv/opencv_contrib/pull/3484"},{"type":"FIX","url":"https://github.com/opencv/opencv_contrib/pull/3484/commits/2b62ff6181163eea029ed1cab11363b4996e9cd6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opencv/opencv","events":[{"introduced":"898c639f6ab195b81a1d3e9b2470a3f03123dd03"},{"fixed":"f9a59f2592993d3dcc080e495f4f5e02dd8ec7ef"}],"database_specific":{"versions":[{"introduced":"4.5.2"},{"fixed":"4.8.0"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-2618.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}