Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
To mitigate this issue, avoid processing untrusted MPEG-PS/VOB media files with FFmpeg. If FFmpeg is used in automated media processing services, implement strict input validation and isolation to prevent the ingestion of malicious files from untrusted sources. For end-user applications, refrain from opening or playing untrusted media files.
Wed, 15 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in FFmpeg. A remote attacker could exploit this vulnerability by providing a specially crafted MPEG-PS/VOB media file containing a malicious DVD subtitle stream. This vulnerability is caused by a signed integer overflow in the DVD subtitle parser's fragment reassembly bounds checks, leading to a heap out-of-bounds write. Successful exploitation can result in a denial of service (DoS) due to an application crash, and potentially lead to arbitrary code execution. | |
| Title | Ffmpeg: ffmpeg: denial of service and potential arbitrary code execution via signed integer overflow in dvd subtitle parser | |
| First Time appeared |
Redhat
Redhat ai Inference Server Redhat enterprise Linux Ai Redhat lightspeed Core Redhat openshift Ai |
|
| Weaknesses | CWE-190 | |
| CPEs | cpe:/a:redhat:ai_inference_server:3 cpe:/a:redhat:enterprise_linux_ai:3 cpe:/a:redhat:lightspeed_core cpe:/a:redhat:openshift_ai |
|
| Vendors & Products |
Redhat
Redhat ai Inference Server Redhat enterprise Linux Ai Redhat lightspeed Core Redhat openshift Ai |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-15T20:01:15.671Z
Reserved: 2026-04-15T19:11:41.901Z
Link: CVE-2026-6385
Updated: 2026-04-15T20:01:09.811Z
Status : Received
Published: 2026-04-15T20:16:44.230
Modified: 2026-04-15T20:16:44.230
Link: CVE-2026-6385
No data.
OpenCVE Enrichment
No data.