Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It’s a reproducible use-after-free in a codec that ships by default with most desktop and server distributions.

The recent iOS zero-day (CVE-2025-43300) targeted the rarely used DNG image format. How long before this FFMPEG vulnerability is exploited to compromise legacy devices in the wild, I wonder?

I’m not a fan of this grandstanding for arguably questionable funding. (I surely would not fund those who believe these issues are slop.) I’d like to think most contributors already understand the severity and genuinely care about keeping FFMPEG secure.



Bugs in little-used corners of the project are a massive red flag, that's how some of the most serious OpenSSL bugs have emerged. If the code is in there, and someone can trigger it with a crafted input, then it is as bad as any other bug.


DNG isn't exactly rarely used, it's Adobe's open raw format and lots of image processing programs read and write it.

It's not a codec made for one game back in 1994, it's still in very active use today if you're using such a rare and uncommon program as Photoshop.


I agree it is a widely used format, however, it is rarely used on iOS devices.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: