{"id":"USN-7871-1","summary":"ffmpeg vulnerability","details":"It was discovered that FFmpeg incorrectly handled memory allocation in the\nALS audio decoder. If a user was tricked into loading a crafted media file,\na remote attacker could possibly use this issue to make FFmpeg crash,\nresulting in a denial of service.","modified":"2026-02-10T04:50:22Z","published":"2025-11-16T23:19:59Z","related":["UBUNTU-CVE-2025-7700"],"upstream":["CVE-2025-7700","UBUNTU-CVE-2025-7700"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7871-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-7700"}],"affected":[{"package":{"name":"ffmpeg","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/ffmpeg@7:7.1.1-1ubuntu4.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7:7.1.1-1ubuntu4.1"}]}],"versions":["7:7.1.1-1ubuntu1","7:7.1.1-1ubuntu2","7:7.1.1-1ubuntu3","7:7.1.1-1ubuntu4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"ffmpeg","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavcodec-dev","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavcodec-extra","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavcodec-extra61","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavcodec61","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavdevice-dev","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavdevice61","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavfilter-dev","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavfilter-extra","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavfilter-extra10","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavfilter10","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavformat-dev","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavformat-extra","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavformat-extra61","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavformat61","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavutil-dev","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libavutil59","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libpostproc-dev","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libpostproc58","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libswresample-dev","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libswresample5","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libswscale-dev","binary_version":"7:7.1.1-1ubuntu4.1"},{"binary_name":"libswscale8","binary_version":"7:7.1.1-1ubuntu4.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7871-1.json","cves_map":{"ecosystem":"Ubuntu:25.10","cves":[{"id":"CVE-2025-7700","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}