<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ffmpeg-4-4.4-5.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10754</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ffmpeg-4-4.4-5.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ffmpeg-4-4.4-5.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10754</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10754</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8216/</URL>
      <Description>SUSE CVE CVE-2015-8216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8217/</URL>
      <Description>SUSE CVE CVE-2015-8217 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8218/</URL>
      <Description>SUSE CVE CVE-2015-8218 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8219/</URL>
      <Description>SUSE CVE CVE-2015-8219 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8363/</URL>
      <Description>SUSE CVE CVE-2015-8363 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8365/</URL>
      <Description>SUSE CVE CVE-2015-8365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8661/</URL>
      <Description>SUSE CVE CVE-2015-8661 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8663/</URL>
      <Description>SUSE CVE CVE-2015-8663 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10190/</URL>
      <Description>SUSE CVE CVE-2016-10190 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10191/</URL>
      <Description>SUSE CVE CVE-2016-10191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1897/</URL>
      <Description>SUSE CVE CVE-2016-1897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11399/</URL>
      <Description>SUSE CVE CVE-2017-11399 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-11665/</URL>
      <Description>SUSE CVE CVE-2017-11665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14054/</URL>
      <Description>SUSE CVE CVE-2017-14054 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14055/</URL>
      <Description>SUSE CVE CVE-2017-14055 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14056/</URL>
      <Description>SUSE CVE CVE-2017-14056 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14057/</URL>
      <Description>SUSE CVE CVE-2017-14057 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14058/</URL>
      <Description>SUSE CVE CVE-2017-14058 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14059/</URL>
      <Description>SUSE CVE CVE-2017-14059 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14169/</URL>
      <Description>SUSE CVE CVE-2017-14169 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14170/</URL>
      <Description>SUSE CVE CVE-2017-14170 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14171/</URL>
      <Description>SUSE CVE CVE-2017-14171 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14222/</URL>
      <Description>SUSE CVE CVE-2017-14222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14223/</URL>
      <Description>SUSE CVE CVE-2017-14223 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-14225/</URL>
      <Description>SUSE CVE CVE-2017-14225 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15186/</URL>
      <Description>SUSE CVE CVE-2017-15186 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-15672/</URL>
      <Description>SUSE CVE CVE-2017-15672 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16840/</URL>
      <Description>SUSE CVE CVE-2017-16840 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17081/</URL>
      <Description>SUSE CVE CVE-2017-17081 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-17555/</URL>
      <Description>SUSE CVE CVE-2017-17555 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7859/</URL>
      <Description>SUSE CVE CVE-2017-7859 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7863/</URL>
      <Description>SUSE CVE CVE-2017-7863 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7866/</URL>
      <Description>SUSE CVE CVE-2017-7866 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-13300/</URL>
      <Description>SUSE CVE CVE-2018-13300 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-13305/</URL>
      <Description>SUSE CVE CVE-2018-13305 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-15822/</URL>
      <Description>SUSE CVE CVE-2018-15822 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6392/</URL>
      <Description>SUSE CVE CVE-2018-6392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6621/</URL>
      <Description>SUSE CVE CVE-2018-6621 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7751/</URL>
      <Description>SUSE CVE CVE-2018-7751 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11338/</URL>
      <Description>SUSE CVE CVE-2019-11338 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-15942/</URL>
      <Description>SUSE CVE CVE-2019-15942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-22046/</URL>
      <Description>SUSE CVE CVE-2020-22046 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-35964/</URL>
      <Description>SUSE CVE CVE-2020-35964 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33815/</URL>
      <Description>SUSE CVE CVE-2021-33815 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38114/</URL>
      <Description>SUSE CVE CVE-2021-38114 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38171/</URL>
      <Description>SUSE CVE CVE-2021-38171 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-4.4-5.2">ffmpeg-4-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-libavcodec-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-libavcodec-devel-4.4-5.2">ffmpeg-4-libavcodec-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-libavdevice-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-libavdevice-devel-4.4-5.2">ffmpeg-4-libavdevice-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-libavfilter-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-libavfilter-devel-4.4-5.2">ffmpeg-4-libavfilter-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-libavformat-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-libavformat-devel-4.4-5.2">ffmpeg-4-libavformat-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-libavresample-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-libavresample-devel-4.4-5.2">ffmpeg-4-libavresample-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-libavutil-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-libavutil-devel-4.4-5.2">ffmpeg-4-libavutil-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-libpostproc-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-libpostproc-devel-4.4-5.2">ffmpeg-4-libpostproc-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-libswresample-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-libswresample-devel-4.4-5.2">ffmpeg-4-libswresample-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-libswscale-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-libswscale-devel-4.4-5.2">ffmpeg-4-libswscale-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg-4-private-devel-4.4-5.2">
      <FullProductName ProductID="ffmpeg-4-private-devel-4.4-5.2">ffmpeg-4-private-devel-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavcodec58_134-4.4-5.2">
      <FullProductName ProductID="libavcodec58_134-4.4-5.2">libavcodec58_134-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavcodec58_134-32bit-4.4-5.2">
      <FullProductName ProductID="libavcodec58_134-32bit-4.4-5.2">libavcodec58_134-32bit-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavdevice58_13-4.4-5.2">
      <FullProductName ProductID="libavdevice58_13-4.4-5.2">libavdevice58_13-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavdevice58_13-32bit-4.4-5.2">
      <FullProductName ProductID="libavdevice58_13-32bit-4.4-5.2">libavdevice58_13-32bit-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavfilter7_110-4.4-5.2">
      <FullProductName ProductID="libavfilter7_110-4.4-5.2">libavfilter7_110-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavfilter7_110-32bit-4.4-5.2">
      <FullProductName ProductID="libavfilter7_110-32bit-4.4-5.2">libavfilter7_110-32bit-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavformat58_76-4.4-5.2">
      <FullProductName ProductID="libavformat58_76-4.4-5.2">libavformat58_76-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavformat58_76-32bit-4.4-5.2">
      <FullProductName ProductID="libavformat58_76-32bit-4.4-5.2">libavformat58_76-32bit-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavresample4_0-4.4-5.2">
      <FullProductName ProductID="libavresample4_0-4.4-5.2">libavresample4_0-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavresample4_0-32bit-4.4-5.2">
      <FullProductName ProductID="libavresample4_0-32bit-4.4-5.2">libavresample4_0-32bit-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavutil56_70-4.4-5.2">
      <FullProductName ProductID="libavutil56_70-4.4-5.2">libavutil56_70-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavutil56_70-32bit-4.4-5.2">
      <FullProductName ProductID="libavutil56_70-32bit-4.4-5.2">libavutil56_70-32bit-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpostproc55_9-4.4-5.2">
      <FullProductName ProductID="libpostproc55_9-4.4-5.2">libpostproc55_9-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpostproc55_9-32bit-4.4-5.2">
      <FullProductName ProductID="libpostproc55_9-32bit-4.4-5.2">libpostproc55_9-32bit-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libswresample3_9-4.4-5.2">
      <FullProductName ProductID="libswresample3_9-4.4-5.2">libswresample3_9-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libswresample3_9-32bit-4.4-5.2">
      <FullProductName ProductID="libswresample3_9-32bit-4.4-5.2">libswresample3_9-32bit-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libswscale5_9-4.4-5.2">
      <FullProductName ProductID="libswscale5_9-4.4-5.2">libswscale5_9-4.4-5.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libswscale5_9-32bit-4.4-5.2">
      <FullProductName ProductID="libswscale5_9-32bit-4.4-5.2">libswscale5_9-32bit-4.4-5.2</FullProductName>
    </Branch>
    <Relationship ProductReference="ffmpeg-4-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-4.4-5.2">ffmpeg-4-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-libavcodec-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2">ffmpeg-4-libavcodec-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-libavdevice-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2">ffmpeg-4-libavdevice-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-libavfilter-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2">ffmpeg-4-libavfilter-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-libavformat-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2">ffmpeg-4-libavformat-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-libavresample-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2">ffmpeg-4-libavresample-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-libavutil-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2">ffmpeg-4-libavutil-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-libpostproc-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2">ffmpeg-4-libpostproc-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-libswresample-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2">ffmpeg-4-libswresample-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-libswscale-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2">ffmpeg-4-libswscale-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ffmpeg-4-private-devel-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2">ffmpeg-4-private-devel-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavcodec58_134-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavcodec58_134-4.4-5.2">libavcodec58_134-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavcodec58_134-32bit-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2">libavcodec58_134-32bit-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavdevice58_13-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavdevice58_13-4.4-5.2">libavdevice58_13-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavdevice58_13-32bit-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2">libavdevice58_13-32bit-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavfilter7_110-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavfilter7_110-4.4-5.2">libavfilter7_110-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavfilter7_110-32bit-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2">libavfilter7_110-32bit-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavformat58_76-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavformat58_76-4.4-5.2">libavformat58_76-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavformat58_76-32bit-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2">libavformat58_76-32bit-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavresample4_0-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavresample4_0-4.4-5.2">libavresample4_0-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavresample4_0-32bit-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2">libavresample4_0-32bit-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavutil56_70-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavutil56_70-4.4-5.2">libavutil56_70-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavutil56_70-32bit-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2">libavutil56_70-32bit-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpostproc55_9-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpostproc55_9-4.4-5.2">libpostproc55_9-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpostproc55_9-32bit-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2">libpostproc55_9-32bit-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libswresample3_9-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libswresample3_9-4.4-5.2">libswresample3_9-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libswresample3_9-32bit-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2">libswresample3_9-32bit-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libswscale5_9-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libswscale5_9-4.4-5.2">libswscale5_9-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libswscale5_9-32bit-4.4-5.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2">libswscale5_9-32bit-4.4-5.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg before 2.8.2 omits certain width and height checks, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted MJPEG data.</Note>
    </Notes>
    <CVE>CVE-2015-8216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8216.html</URL>
        <Description>CVE-2015-8216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955346</URL>
        <Description>SUSE Bug 955346</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg before 2.8.2 does not validate the Chroma Format Indicator, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted High Efficiency Video Coding (HEVC) data.</Note>
    </Notes>
    <CVE>CVE-2015-8217</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8217.html</URL>
        <Description>CVE-2015-8217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955347</URL>
        <Description>SUSE Bug 955347</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The decode_uncompressed function in libavcodec/faxcompr.c in FFmpeg before 2.8.2 does not validate uncompressed runs, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted CCITT FAX data.</Note>
    </Notes>
    <CVE>CVE-2015-8218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8218.html</URL>
        <Description>CVE-2015-8218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955348</URL>
        <Description>SUSE Bug 955348</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The init_tile function in libavcodec/jpeg2000dec.c in FFmpeg before 2.8.2 does not enforce minimum-value and maximum-value constraints on tile coordinates, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data.</Note>
    </Notes>
    <CVE>CVE-2015-8219</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8219.html</URL>
        <Description>CVE-2015-8219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955350</URL>
        <Description>SUSE Bug 955350</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not enforce uniqueness of the SIZ marker in a JPEG 2000 image, which allows remote attackers to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified other impact via a crafted image with two or more of these markers.</Note>
    </Notes>
    <CVE>CVE-2015-8363</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8363.html</URL>
        <Description>CVE-2015-8363</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957114</URL>
        <Description>SUSE Bug 957114</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The smka_decode_frame function in libavcodec/smacker.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through 2.8.2 does not verify that the data size is consistent with the number of channels, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Smacker data.</Note>
    </Notes>
    <CVE>CVE-2015-8365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8365.html</URL>
        <Description>CVE-2015-8365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/957116</URL>
        <Description>SUSE Bug 957116</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The h264_slice_header_init function in libavcodec/h264_slice.c in FFmpeg before 2.8.3 does not validate the relationship between the number of threads and the number of slices, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted H.264 data.</Note>
    </Notes>
    <CVE>CVE-2015-8661</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8661.html</URL>
        <Description>CVE-2015-8661</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960385</URL>
        <Description>SUSE Bug 960385</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ff_get_buffer function in libavcodec/utils.c in FFmpeg before 2.8.4 preserves width and height values after a failure, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted .mov file.</Note>
    </Notes>
    <CVE>CVE-2015-8663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8663.html</URL>
        <Description>CVE-2015-8663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960383</URL>
        <Description>SUSE Bug 960383</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote web servers to execute arbitrary code via a negative chunk size in an HTTP response.</Note>
    </Notes>
    <CVE>CVE-2016-10190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10190.html</URL>
        <Description>CVE-2016-10190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022920</URL>
        <Description>SUSE Bug 1022920</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches.</Note>
    </Notes>
    <CVE>CVE-2016-10191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10191.html</URL>
        <Description>CVE-2016-10191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022921</URL>
        <Description>SUSE Bug 1022921</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FFmpeg 2.x allows remote attackers to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.</Note>
    </Notes>
    <CVE>CVE-2016-1897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1897.html</URL>
        <Description>CVE-2016-1897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961937</URL>
        <Description>SUSE Bug 961937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the ape_decode_frame function in libavcodec/apedec.c in FFmpeg 2.4 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access and application crash) or possibly have unspecified other impact via a crafted APE file.</Note>
    </Notes>
    <CVE>CVE-2017-11399</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11399.html</URL>
        <Description>CVE-2017-11399</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1049095</URL>
        <Description>SUSE Bug 1049095</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ff_amf_get_field_value function in libavformat/rtmppkt.c in FFmpeg 3.3.2 allows remote RTMP servers to cause a denial of service (Segmentation Violation and application crash) via a crafted stream.</Note>
    </Notes>
    <CVE>CVE-2017-11665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-11665.html</URL>
        <Description>CVE-2017-11665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082335</URL>
        <Description>SUSE Bug 1082335</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libavformat/rmdec.c in FFmpeg 3.3.3, a DoS in ivr_read_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted IVR file, which claims a large "len" field in the header but does not contain sufficient backing data, is provided, the first type==4 loop would consume huge CPU resources, since there is no EOF check inside the loop.</Note>
    </Notes>
    <CVE>CVE-2017-14054</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14054.html</URL>
        <Description>CVE-2017-14054</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056765</URL>
        <Description>SUSE Bug 1056765</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libavformat/mvdec.c in FFmpeg 3.3.3, a DoS in mv_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MV file, which claims a large "nb_frames" field in the header but does not contain sufficient backing data, is provided, the loop over the frames would consume huge CPU and memory resources, since there is no EOF check inside the loop.</Note>
    </Notes>
    <CVE>CVE-2017-14055</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14055.html</URL>
        <Description>CVE-2017-14055</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056766</URL>
        <Description>SUSE Bug 1056766</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libavformat/rl2.c in FFmpeg 3.3.3, a DoS in rl2_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted RL2 file, which claims a large "frame_count" field in the header but does not contain sufficient backing data, is provided, the loops (for offset and size tables) would consume huge CPU and memory resources, since there is no EOF check inside these loops.</Note>
    </Notes>
    <CVE>CVE-2017-14056</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14056.html</URL>
        <Description>CVE-2017-14056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056760</URL>
        <Description>SUSE Bug 1056760</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FFmpeg 3.3.3, a DoS in asf_read_marker() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted ASF file, which claims a large "name_len" or "count" field in the header but does not contain sufficient backing data, is provided, the loops over the name and markers would consume huge CPU and memory resources, since there is no EOF check inside these loops.</Note>
    </Notes>
    <CVE>CVE-2017-14057</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14057.html</URL>
        <Description>CVE-2017-14057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056761</URL>
        <Description>SUSE Bug 1056761</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FFmpeg 2.4 and 3.3.3, the read_data function in libavformat/hls.c does not restrict reload attempts for an insufficient list, which allows remote attackers to cause a denial of service (infinite loop).</Note>
    </Notes>
    <CVE>CVE-2017-14058</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14058.html</URL>
        <Description>CVE-2017-14058</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056762</URL>
        <Description>SUSE Bug 1056762</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large "duration" field in the header but does not contain sufficient backing data, is provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.</Note>
    </Notes>
    <CVE>CVE-2017-14059</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14059.html</URL>
        <Description>CVE-2017-14059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1056763</URL>
        <Description>SUSE Bug 1056763</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3 -&gt; 2.4, an integer signedness error might occur when a crafted file, which claims a large "item_num" field such as 0xffffffff, is provided. As a result, the variable "item_num" turns negative, bypassing the check for a large value.</Note>
    </Notes>
    <CVE>CVE-2017-14169</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14169.html</URL>
        <Description>CVE-2017-14169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057536</URL>
        <Description>SUSE Bug 1057536</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libavformat/mxfdec.c in FFmpeg 3.3.3 -&gt; 2.4, a DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted MXF file, which claims a large "nb_index_entries" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU resources, since there is no EOF check inside the loop. Moreover, this big loop can be invoked multiple times if there is more than one applicable data segment in the crafted MXF file.</Note>
    </Notes>
    <CVE>CVE-2017-14170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14170.html</URL>
        <Description>CVE-2017-14170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057537</URL>
        <Description>SUSE Bug 1057537</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 'table_entries_used' would consume huge CPU resources, since there is no EOF check inside the loop.</Note>
    </Notes>
    <CVE>CVE-2017-14171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14171.html</URL>
        <Description>CVE-2017-14171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1057539</URL>
        <Description>SUSE Bug 1057539</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libavformat/mov.c in FFmpeg 3.3.3, a DoS in read_tfra() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MOV file, which claims a large "item_count" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.</Note>
    </Notes>
    <CVE>CVE-2017-14222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14222.html</URL>
        <Description>CVE-2017-14222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058020</URL>
        <Description>SUSE Bug 1058020</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.</Note>
    </Notes>
    <CVE>CVE-2017-14223</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14223.html</URL>
        <Description>CVE-2017-14223</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058019</URL>
        <Description>SUSE Bug 1058019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The av_color_primaries_name function in libavutil/pixdesc.c in FFmpeg 3.3.3 may return a NULL pointer depending on a value contained in a file, but callers do not anticipate this, as demonstrated by the avcodec_string function in libavcodec/utils.c, leading to a NULL pointer dereference. (It is also conceivable that there is security relevance for a NULL pointer dereference in av_color_primaries_name calls within the ffprobe command-line program.)</Note>
    </Notes>
    <CVE>CVE-2017-14225</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-14225.html</URL>
        <Description>CVE-2017-14225</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1058018</URL>
        <Description>SUSE Bug 1058018</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in FFmpeg 3.3.4 and earlier allows remote attackers to cause a denial of service via a crafted AVI file.</Note>
    </Notes>
    <CVE>CVE-2017-15186</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15186.html</URL>
        <Description>CVE-2017-15186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1064577</URL>
        <Description>SUSE Bug 1064577</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The read_header function in libavcodec/ffv1dec.c in FFmpeg 2.4 and 3.3.4 and possibly earlier allows remote attackers to have unspecified impact via a crafted MP4 file, which triggers an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2017-15672</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15672.html</URL>
        <Description>CVE-2017-15672</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066428</URL>
        <Description>SUSE Bug 1066428</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The VC-2 Video Compression encoder in FFmpeg 3.0 and 3.4 allows remote attackers to cause a denial of service (out-of-bounds read) because of incorrect buffer padding for non-Haar wavelets, related to libavcodec/vc2enc.c and libavcodec/vc2enc_dwt.c.</Note>
    </Notes>
    <CVE>CVE-2017-16840</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16840.html</URL>
        <Description>CVE-2017-16840</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069407</URL>
        <Description>SUSE Bug 1069407</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The gmc_mmx function in libavcodec/x86/mpegvideodsp.c in FFmpeg 2.3 and 3.4 does not properly validate widths and heights, which allows remote attackers to cause a denial of service (integer signedness error and out-of-array read) via a crafted MPEG file.</Note>
    </Notes>
    <CVE>CVE-2017-17081</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17081.html</URL>
        <Description>CVE-2017-17081</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1070762</URL>
        <Description>SUSE Bug 1070762</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The swri_audio_convert function in audioconvert.c in FFmpeg libswresample through 3.0.101, as used in FFmpeg 3.4.1, aubio 0.4.6, and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted audio file.</Note>
    </Notes>
    <CVE>CVE-2017-17555</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-17555.html</URL>
        <Description>CVE-2017-17555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1072366</URL>
        <Description>SUSE Bug 1072366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FFmpeg before 2017-03-05 has an out-of-bounds write caused by a heap-based buffer overflow related to the ff_h264_slice_context_init function in libavcodec/h264dec.c.</Note>
    </Notes>
    <CVE>CVE-2017-7859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7859.html</URL>
        <Description>CVE-2017-7859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034183</URL>
        <Description>SUSE Bug 1034183</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FFmpeg before 2017-02-04 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame_common function in libavcodec/pngdec.c.</Note>
    </Notes>
    <CVE>CVE-2017-7863</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7863.html</URL>
        <Description>CVE-2017-7863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034179</URL>
        <Description>SUSE Bug 1034179</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FFmpeg before 2017-01-23 has an out-of-bounds write caused by a stack-based buffer overflow related to the decode_zbuf function in libavcodec/pngdec.c.</Note>
    </Notes>
    <CVE>CVE-2017-7866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7866.html</URL>
        <Description>CVE-2017-7866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034176</URL>
        <Description>SUSE Bug 1034176</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FFmpeg 3.2 and 4.0.1, an improper argument (AVCodecParameters) passed to the avpriv_request_sample function in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array read while converting a crafted AVI file to MPEG4, leading to a denial of service and possibly an information disclosure.</Note>
    </Notes>
    <CVE>CVE-2018-13300</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-13300.html</URL>
        <Description>CVE-2018-13300</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100348</URL>
        <Description>SUSE Bug 1100348</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FFmpeg 4.0.1, due to a missing check for negative values of the mquant variable, the vc1_put_blocks_clamped function in libavcodec/vc1_block.c may trigger an out-of-array access while converting a crafted AVI file to MPEG4, leading to an information disclosure or a denial of service.</Note>
    </Notes>
    <CVE>CVE-2018-13305</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-13305.html</URL>
        <Description>CVE-2018-13305</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1100345</URL>
        <Description>SUSE Bug 1100345</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The flv_write_packet function in libavformat/flvenc.c in FFmpeg through 2.8 does not check for an empty audio packet, leading to an assertion failure.</Note>
    </Notes>
    <CVE>CVE-2018-15822</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-15822.html</URL>
        <Description>CVE-2018-15822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105869</URL>
        <Description>SUSE Bug 1105869</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The filter_slice function in libavfilter/vf_transpose.c in FFmpeg through 3.4.1 allows remote attackers to cause a denial of service (out-of-array access) via a crafted MP4 file.</Note>
    </Notes>
    <CVE>CVE-2018-6392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6392.html</URL>
        <Description>CVE-2018-6392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078488</URL>
        <Description>SUSE Bug 1078488</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The decode_frame function in libavcodec/utvideodec.c in FFmpeg through 3.2 allows remote attackers to cause a denial of service (out of array read) via a crafted AVI file.</Note>
    </Notes>
    <CVE>CVE-2018-6621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6621.html</URL>
        <Description>CVE-2018-6621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1079368</URL>
        <Description>SUSE Bug 1079368</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The svg_probe function in libavformat/img2dec.c in FFmpeg through 3.4.2 allows remote attackers to cause a denial of service (Infinite Loop) via a crafted XML file.</Note>
    </Notes>
    <CVE>CVE-2018-7751</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7751.html</URL>
        <Description>CVE-2018-7751</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090826</URL>
        <Description>SUSE Bug 1090826</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libavcodec/hevcdec.c in FFmpeg 3.4 and 4.1.2 mishandles detection of duplicate first slices, which allows remote attackers to cause a denial of service (NULL pointer dereference and out-of-array access) or possibly have unspecified other impact via crafted HEVC data.</Note>
    </Notes>
    <CVE>CVE-2019-11338</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11338.html</URL>
        <Description>CVE-2019-11338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1133155</URL>
        <Description>SUSE Bug 1133155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FFmpeg through 4.2 has a "Conditional jump or move depends on uninitialised value" issue in h2645_parse because alloc_rbsp_buffer in libavcodec/h2645_parse.c mishandles rbsp_buffer.</Note>
    </Notes>
    <CVE>CVE-2019-15942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-15942.html</URL>
        <Description>CVE-2019-15942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1149839</URL>
        <Description>SUSE Bug 1149839</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the avpriv_float_dsp_allocl function in libavutil/float_dsp.c.</Note>
    </Notes>
    <CVE>CVE-2020-22046</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-22046.html</URL>
        <Description>CVE-2020-22046</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186849</URL>
        <Description>SUSE Bug 1186849</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">track_header in libavformat/vividas.c in FFmpeg 4.3.1 has an out-of-bounds write because of incorrect extradata packing.</Note>
    </Notes>
    <CVE>CVE-2020-35964</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-35964.html</URL>
        <Description>CVE-2020-35964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180519</URL>
        <Description>SUSE Bug 1180519</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">dwa_uncompress in libavcodec/exr.c in FFmpeg 4.4 allows an out-of-bounds array access because dc_count is not strictly checked.</Note>
    </Notes>
    <CVE>CVE-2021-33815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33815.html</URL>
        <Description>CVE-2021-33815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186865</URL>
        <Description>SUSE Bug 1186865</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868.</Note>
    </Notes>
    <CVE>CVE-2021-38114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38114.html</URL>
        <Description>CVE-2021-38114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189142</URL>
        <Description>SUSE Bug 1189142</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">adts_decode_extradata in libavformat/adtsenc.c in FFmpeg 4.4 does not check the init_get_bits return value, which is a necessary step because the second argument to init_get_bits can be crafted.</Note>
    </Notes>
    <CVE>CVE-2021-38171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavcodec-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavdevice-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavfilter-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavformat-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libavutil-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libpostproc-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswresample-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-libswscale-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ffmpeg-4-private-devel-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavcodec58_134-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavdevice58_13-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavfilter7_110-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavformat58_76-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavresample4_0-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libavutil56_70-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpostproc55_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswresample3_9-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-32bit-4.4-5.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libswscale5_9-4.4-5.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38171.html</URL>
        <Description>CVE-2021-38171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189724</URL>
        <Description>SUSE Bug 1189724</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
