Bug 2141912 (CVE-2022-3718)

Summary: CVE-2022-3718 exiv2: Heap-buffer-overflow in Exiv2::MemIo::read
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jgrulich
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-11-14 10:27:08 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2141916, 2141917, 2141918, 2141919, 2141920, 2141921, 2141922    
Bug Blocks: 2140151    

Description Sandipan Roy 2022-11-11 05:09:00 UTC
CVE-2022-3718 (https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52053):

A vulnerability, which was classified as problematic, was found in Exiv2. This affects the function QuickTimeVideo::decodeBlock of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to null pointer dereference. It is possible to initiate the attack remotely. The name of the patch is 459910c36a21369c09b75bcfa82f287c9da56abf. It is recommended to apply a patch to fix this issue. The identifier VDB-212349 was assigned to this vulnerability.

Patch: https://github.com/Exiv2/exiv2/commit/459910c36a21369c09b75bcfa82f287c9da56abf

Comment 1 Sandipan Roy 2022-11-11 05:54:47 UTC
Created exiv2 tracking bugs for this issue:

Affects: fedora-35 [bug 2141916]
Affects: fedora-36 [bug 2141918]


Created mingw-exiv2 tracking bugs for this issue:

Affects: fedora-35 [bug 2141917]
Affects: fedora-36 [bug 2141919]

Comment 3 Jan Grulich 2022-11-14 10:27:08 UTC
This is a CVE for quicktime video which is not built in any RHEL or Fedora release and therefore our packages are not affected.