An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, version 4.1.0. A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability. References: https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853
Created opencv tracking bugs for this issue: Affects: fedora-all [bug 1790060]
External References: https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853
Mitigation: Avoid loading OpenCV data structures from external untrusted JSON files.
Statement: This flaw did not affect the versions of OpenCV as shipped with Red Hat Enterprise Linux 6, 7, and 8, as they did not include the vulnerable code, which was introduced in a later version of the library.
Upstream fix: https://github.com/opencv/opencv/commit/f42d5399aac80d371b17d689851406669c9b9111
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-5064