CVE-2025-69693

NameCVE-2025-69693
DescriptionOut-of-bounds read in FFmpeg 8.0 and 8.0.1 RV60 video decoder (libavcodec/rv60dec.c). The quantization parameter (qp) validation at line 2267 only checks the lower bound (qp < 0) but is missing upper bound validation. The qp value can reach 65 (base value 63 from 6-bit frame header + offset +2 from read_qp_offset) while the rv60_qp_to_idx array has size 64 (valid indices 0-63). This results in out-of-bounds array access at lines 1554 (decode_cbp8), 1655 (decode_cbp16), and 1419/1421 (get_c4x4_set), potentially leading to memory disclosure or crash. A previous fix in commit 61cbcaf93f added validation only for intra frames. This vulnerability affects the released versions 8.0 (released 2025-08-22) and 8.0.1 (released 2025-11-20) and is fixed in git master commit 8abeb879df which will be included in FFmpeg 8.1.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ffmpeg (PTS)bullseye7:4.3.7-0+deb11u1fixed
bullseye (security)7:4.3.9-0+deb11u2fixed
bookworm, bookworm (security)7:5.1.8-0+deb12u1fixed
trixie (security), trixie7:7.1.3-0+deb13u1fixed
forky, sid7:8.0.1-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ffmpegsourcebullseye(not affected)
ffmpegsourcebookworm(not affected)
ffmpegsourcetrixie(not affected)
ffmpegsource(unstable)(unfixed)

Notes

[trixie] - ffmpeg <not-affected> (Vulnerable code not present)
[bookworm] - ffmpeg <not-affected> (Vulnerable code not present)
[bullseye] - ffmpeg <not-affected> (Vulnerable code not present)
Fixed by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/8abeb879df66ea8d27ce1735925ced5a30813de4 (n8.1)
Introduced by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/33802e7c32376c33c61f62aa8052610db5f5c6f0 (n8.0)

Search for package or bug name: Reporting problems