{
  "threat_severity" : "Moderate",
  "public_date" : "2024-08-07T00:00:00Z",
  "bugzilla" : {
    "description" : "ffmpeg: NULL pointer dereference in Firequalizer filter (libavfilter/af_firequalizer.c)",
    "id" : "2394495",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2394495"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
    "status" : "draft"
  },
  "cwe" : "CWE-476",
  "details" : [ "A NULL pointer dereference vulnerability exists in FFmpeg’s Firequalizer filter (libavfilter/af_firequalizer.c) due to a missing check on the return value of av_malloc_array() in the config_input() function. An attacker could exploit this by tricking a victim into processing a crafted media file with the Firequalizer filter enabled, causing the application to dereference a NULL pointer and crash, leading to denial of service.", "A NULL pointer dereference vulnerability exists in FFmpeg’s Firequalizer filter (libavfilter/af_firequalizer.c) due to a missing check on the return value of av_malloc_array() in the config_input() function. An attacker could exploit this by tricking a victim into processing a crafted media file with the Firequalizer filter enabled, causing the application to dereference a NULL pointer and crash, leading to denial of service." ],
  "statement" : "This issue is rated Moderate severity, because exploitation requires a victim to process a specially crafted input that triggers a memory allocation failure in the Firequalizer filter. While FFmpeg is often used to process untrusted media, the impact is limited to denial of service without risk of code execution or memory corruption, keeping the severity at moderate.\nThe flaw was introduced with upstream commit https://github.com/FFmpeg/FFmpeg/commit/d3be186ed1bcdcf2c093d6b13a0e66dc5132be2a with the addition of the dumpfile and dumpscale options and affects FFmpeg versions 3.2 through 8.0.",
  "acknowledgement" : "Red Hat would like to thank Jiasheng Jiang for reporting this issue.",
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-10256\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-10256\nhttps://github.com/FFmpeg/FFmpeg/commit/a25462482c02c004d685a8fcf2fa63955aaa0931\nhttps://github.com/FFmpeg/FFmpeg/commit/d3be186ed1bcdcf2c093d6b13a0e66dc5132be2a" ],
  "name" : "CVE-2025-10256",
  "mitigation" : {
    "value" : "No mitigation is currently available that meets Red Hat Product Security's standards for usability, deployment, applicability, or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}