Bug 2141908 (CVE-2022-3756)

Summary: CVE-2022-3756 exiv2: integer overflow in quicktimevideo.cpp
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jgrulich
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-11-14 10:26:49 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2141916, 2141917, 2141918, 2141919, 2141920, 2141921, 2141922    
Bug Blocks: 2140151    

Description Sandipan Roy 2022-11-11 04:43:25 UTC
A vulnerability was found in Exiv2. It has been classified as critical. Affected is the function QuickTimeVideo::userDataDecoder of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The name of the patch is bf4f28b727bdedbd7c88179c30d360e54568a62e. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-212496.

https://vuldb.com/?id.212496
https://github.com/Exiv2/exiv2/commit/bf4f28b727bdedbd7c88179c30d360e54568a62e

Comment 1 Sandipan Roy 2022-11-11 05:54:33 UTC
Created exiv2 tracking bugs for this issue:

Affects: fedora-35 [bug 2141916]
Affects: fedora-36 [bug 2141918]


Created mingw-exiv2 tracking bugs for this issue:

Affects: fedora-35 [bug 2141917]
Affects: fedora-36 [bug 2141919]

Comment 3 Jan Grulich 2022-11-14 10:26:49 UTC
This is a CVE for quicktime video which is not built in any RHEL or Fedora release and therefore our packages are not affected.