<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libvlc5-2.2.4-11.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10064-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libvlc5-2.2.4-11.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libvlc5-2.2.4-11.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10064</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2937/</URL>
      <Description>SUSE CVE CVE-2010-2937 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3907/</URL>
      <Description>SUSE CVE CVE-2010-3907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2587/</URL>
      <Description>SUSE CVE CVE-2011-2587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2588/</URL>
      <Description>SUSE CVE CVE-2011-2588 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-9625/</URL>
      <Description>SUSE CVE CVE-2014-9625 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5949/</URL>
      <Description>SUSE CVE CVE-2015-5949 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7981/</URL>
      <Description>SUSE CVE CVE-2015-7981 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8126/</URL>
      <Description>SUSE CVE CVE-2015-8126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5108/</URL>
      <Description>SUSE CVE CVE-2016-5108 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libvlc5-2.2.4-11.1">
      <FullProductName ProductID="libvlc5-2.2.4-11.1">libvlc5-2.2.4-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libvlccore8-2.2.4-11.1">
      <FullProductName ProductID="libvlccore8-2.2.4-11.1">libvlccore8-2.2.4-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vlc-2.2.4-11.1">
      <FullProductName ProductID="vlc-2.2.4-11.1">vlc-2.2.4-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vlc-codec-gstreamer-2.2.4-11.1">
      <FullProductName ProductID="vlc-codec-gstreamer-2.2.4-11.1">vlc-codec-gstreamer-2.2.4-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vlc-devel-2.2.4-11.1">
      <FullProductName ProductID="vlc-devel-2.2.4-11.1">vlc-devel-2.2.4-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vlc-lang-2.2.4-11.1">
      <FullProductName ProductID="vlc-lang-2.2.4-11.1">vlc-lang-2.2.4-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vlc-noX-2.2.4-11.1">
      <FullProductName ProductID="vlc-noX-2.2.4-11.1">vlc-noX-2.2.4-11.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vlc-qt-2.2.4-11.1">
      <FullProductName ProductID="vlc-qt-2.2.4-11.1">vlc-qt-2.2.4-11.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libvlc5-2.2.4-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvlc5-2.2.4-11.1">libvlc5-2.2.4-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libvlccore8-2.2.4-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libvlccore8-2.2.4-11.1">libvlccore8-2.2.4-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vlc-2.2.4-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vlc-2.2.4-11.1">vlc-2.2.4-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vlc-codec-gstreamer-2.2.4-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1">vlc-codec-gstreamer-2.2.4-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vlc-devel-2.2.4-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vlc-devel-2.2.4-11.1">vlc-devel-2.2.4-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vlc-lang-2.2.4-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vlc-lang-2.2.4-11.1">vlc-lang-2.2.4-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vlc-noX-2.2.4-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vlc-noX-2.2.4-11.1">vlc-noX-2.2.4-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vlc-qt-2.2.4-11.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vlc-qt-2.2.4-11.1">vlc-qt-2.2.4-11.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ReadMetaFromId3v2 function in taglib.cpp in the TagLib plugin in VideoLAN VLC media player 0.9.0 through 1.1.2 does not properly process ID3v2 tags, which allows remote attackers to cause a denial of service (application crash) via a crafted media file.</Note>
    </Notes>
    <CVE>CVE-2010-2937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvlc5-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvlccore8-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-devel-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-lang-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-noX-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-qt-2.2.4-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2937.html</URL>
        <Description>CVE-2010-2937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in real.c in the Real demuxer plugin in VideoLAN VLC Media Player before 1.1.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a zero i_subpackets value in a Real Media file, leading to a heap-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2010-3907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvlc5-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvlccore8-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-devel-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-lang-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-noX-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-qt-2.2.4-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3907.html</URL>
        <Description>CVE-2010-3907</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the DemuxAudioSipr function in real.c in the RealMedia demuxer in VideoLAN VLC media player 1.1.x before 1.1.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Real Media file.</Note>
    </Notes>
    <CVE>CVE-2011-2587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvlc5-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvlccore8-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-devel-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-lang-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-noX-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-qt-2.2.4-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2587.html</URL>
        <Description>CVE-2011-2587</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the AVI_ChunkRead_strf function in libavi.c in the AVI demuxer in VideoLAN VLC media player before 1.1.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted AVI media file.</Note>
    </Notes>
    <CVE>CVE-2011-2588</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvlc5-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvlccore8-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-devel-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-lang-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-noX-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-qt-2.2.4-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2588.html</URL>
        <Description>CVE-2011-2588</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integer truncation" vulnerability.</Note>
    </Notes>
    <CVE>CVE-2014-9625</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvlc5-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvlccore8-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-devel-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-lang-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-noX-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-qt-2.2.4-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-9625.html</URL>
        <Description>CVE-2014-9625</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914268</URL>
        <Description>SUSE Bug 914268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920781</URL>
        <Description>SUSE Bug 920781</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">VideoLAN VLC media player 2.2.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted 3GP file, which triggers the freeing of arbitrary pointers.</Note>
    </Notes>
    <CVE>CVE-2015-5949</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvlc5-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvlccore8-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-devel-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-lang-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-noX-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-qt-2.2.4-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5949.html</URL>
        <Description>CVE-2015-5949</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965227</URL>
        <Description>SUSE Bug 965227</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2015-7981</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvlc5-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvlccore8-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-devel-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-lang-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-noX-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-qt-2.2.4-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7981.html</URL>
        <Description>CVE-2015-7981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952051</URL>
        <Description>SUSE Bug 952051</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.</Note>
    </Notes>
    <CVE>CVE-2015-8126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvlc5-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvlccore8-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-devel-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-lang-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-noX-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-qt-2.2.4-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8126.html</URL>
        <Description>CVE-2015-8126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/954980</URL>
        <Description>SUSE Bug 954980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/958198</URL>
        <Description>SUSE Bug 958198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969333</URL>
        <Description>SUSE Bug 969333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file.</Note>
    </Notes>
    <CVE>CVE-2016-5108</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libvlc5-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libvlccore8-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-codec-gstreamer-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-devel-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-lang-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-noX-2.2.4-11.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vlc-qt-2.2.4-11.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5108.html</URL>
        <Description>CVE-2016-5108</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/984382</URL>
        <Description>SUSE Bug 984382</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
