Bug 2346056 (CVE-2025-1373)

Summary: CVE-2025-1373 ffmpeg: FFmpeg MOV Parser mov.c mov_read_trak null pointer dereference
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in FFmpeg. This vulnerability allows a null pointer dereference function in libavformat/mov.c, leading to potential crashes when processing maliciously crafted MOV files.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2346103    
Bug Blocks:    

Description OSIDB Bzimport 2025-02-17 04:01:10 UTC
A vulnerability was found in FFmpeg up to 7.1. It has been rated as problematic. Affected by this issue is the function mov_read_trak of the file libavformat/mov.c of the component MOV Parser. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The patch is identified as 43be8d07281caca2e88bfd8ee2333633e1fb1a13. It is recommended to apply a patch to fix this issue.

Comment 2 Dominik 'Rathann' Mierzejewski 2025-03-07 20:59:41 UTC
Upstream ticket: https://trac.ffmpeg.org/ticket/11460 .

The patch doesn't apply to 7.1 and older, because the code is different.