| Name | CVE-2025-12343 |
| Description | A flaw was found in FFmpeg’s TensorFlow backend within the libavfilter/dnn_backend_tf.c source file. The issue occurs in the dnn_execute_model_tf() function, where a task object is freed multiple times in certain error-handling paths. This redundant memory deallocation can lead to a double-free condition, potentially causing FFmpeg or any application using it to crash when processing TensorFlow-based DNN models. This results in a denial-of-service scenario but does not allow arbitrary code execution under normal conditions. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DSA-6007-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| ffmpeg (PTS) | bullseye | 7:4.3.7-0+deb11u1 | fixed |
| bullseye (security) | 7:4.3.9-0+deb11u2 | fixed | |
| bookworm, bookworm (security) | 7:5.1.8-0+deb12u1 | fixed | |
| trixie (security), trixie | 7:7.1.3-0+deb13u1 | fixed | |
| forky, sid | 7:8.0.1-3 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| ffmpeg | source | bullseye | (not affected) | |||
| ffmpeg | source | bookworm | (not affected) | |||
| ffmpeg | source | trixie | 7:7.1.2-0+deb13u1 | DSA-6007-1 | ||
| ffmpeg | source | (unstable) | 7:7.1.2-1 |
[bookworm] - ffmpeg <not-affected> (Vulnerable code not present)
[bullseye] - ffmpeg <not-affected> (Vulnerable code not present)
Fixed by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/b8d5f65b9e89d893f27cf00799dbc15fc0ca2f8e (master)
Fixed by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/729dd9b2865bedd6a8160ef574db0d391c491bee (n7.1.2)
Introduced by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/af052f9066a14ab633ef8e0bda49a432771efe74 (n6.1)