CVE-2026-30998: n/a
An improper resource deallocation and closure vulnerability in the tools/zmqsend.c component of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted input file.
AI Analysis
Technical Summary
This vulnerability in FFmpeg v8.0.1's tools/zmqsend.c component arises from improper handling of resource deallocation and closure. When processing a specially crafted input file, the flaw can lead to a Denial of Service by causing the application to crash or become unresponsive. The CVE record does not provide a CVSS score or details about available patches or fixes. The vulnerability was published on April 13, 2026, with no known exploits currently reported.
Potential Impact
Successful exploitation results in a Denial of Service, potentially disrupting media processing workflows that utilize the affected FFmpeg component. There is no indication of code execution or data breach from the provided information.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should consider avoiding processing untrusted input files with the affected FFmpeg version or apply other protective measures as recommended by the vendor once available.
CVE-2026-30998: n/a
Description
An improper resource deallocation and closure vulnerability in the tools/zmqsend.c component of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via supplying a crafted input file.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability in FFmpeg v8.0.1's tools/zmqsend.c component arises from improper handling of resource deallocation and closure. When processing a specially crafted input file, the flaw can lead to a Denial of Service by causing the application to crash or become unresponsive. The CVE record does not provide a CVSS score or details about available patches or fixes. The vulnerability was published on April 13, 2026, with no known exploits currently reported.
Potential Impact
Successful exploitation results in a Denial of Service, potentially disrupting media processing workflows that utilize the affected FFmpeg component. There is no indication of code execution or data breach from the provided information.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should consider avoiding processing untrusted input files with the affected FFmpeg version or apply other protective measures as recommended by the vendor once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-03-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69dd057082d89c981f016d87
Added to database: 4/13/2026, 3:02:08 PM
Last enriched: 4/13/2026, 3:32:38 PM
Last updated: 4/14/2026, 8:18:19 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.