ffmpeg vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ffmpeg package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-36616

<7:7.0.1-3
  • L
CVE-2024-36619

<7:7.1-3
  • L
CVE-2024-35366

<7:7.0.1-3
  • L
CVE-2024-36618

<7:7.0.1-3
  • L
CVE-2024-36615

<7:7.1-3
  • L
CVE-2024-36617

<7:7.0.1-3
  • L
CVE-2024-35368

<7:7.1-3
  • L
CVE-2024-35367

<7:7.0.1-3
  • L
CVE-2024-35369

<7:7.0.1-3
  • L
CVE-2024-7055

<7:7.0.2-1
  • H
Out-of-bounds Write

<7:6.0-4
  • L
CVE-2024-32228

<7:7.0.1-3
  • H
Buffer Overflow

<7:7.0.1-3
  • L
CVE-2023-51794

<7:7.0.1-3
  • L
CVE-2023-51796

<7:7.0.1-3
  • L
CVE-2023-51798

<7:7.0.1-3
  • L
CVE-2023-51791

<7:7.0.1-3
  • L
CVE-2023-49501

<7:7.0.1-3
  • L
CVE-2023-49502

<7:7.0.1-3
  • L
CVE-2023-50008

<7:7.0.1-3
  • L
CVE-2023-50010

<7:7.0.1-3
  • L
CVE-2023-51795

<7:7.0.1-3
  • L
CVE-2023-50007

<7:7.0.1-3
  • L
CVE-2023-50009

<7:7.0.1-3
  • L
CVE-2023-51797

<7:7.0.1-3
  • L
CVE-2023-51793

<7:7.0.1-3
  • L
CVE-2024-31578

<7:7.0.1-3
  • L
CVE-2024-31581

<7:7.0.1-3
  • L
CVE-2024-31582

<7:7.0.1-3
  • L
CVE-2024-31585

<7:7.0.1-3
  • L
CVE-2023-49528

<7:7.0.1-3
  • C
Integer Overflow or Wraparound

<7:6.1-1
  • H
Integer Overflow or Wraparound

<7:6.1-1
  • C
Integer Overflow or Wraparound

<7:6.1-1
  • M
Integer Overflow or Wraparound

<7:4.4-5
  • H
CVE-2022-4907

<7:6.0-4
  • H
Use After Free

<7:5.1.2-1
  • M
NULL Pointer Dereference

<7:5.1-1
  • H
NULL Pointer Dereference

<7:5.1-1
  • H
Out-of-Bounds

<7:5.1.3-1
  • H
Out-of-Bounds

<7:5.1.3-1
  • H
Integer Overflow or Wraparound

<7:5.1.1-1
  • M
Integer Overflow or Wraparound

<7:4.4.2-1
  • M
Insufficient Verification of Data Authenticity

<7:4.3.1-1
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • H
Buffer Overflow

<7:4.3-2
  • H
NULL Pointer Dereference

<7:4.3-2
  • H
Divide By Zero

<7:4.3-2
  • M
Out-of-bounds Read

<7:4.2.2-1
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • M
Use After Free

<7:4.4-5
  • H
Use After Free

<7:4.4-5
  • C
Unchecked Return Value

<7:4.4.1-1
  • L
Reachable Assertion

<7:4.4.1-1
  • M
CVE-2021-3566

<7:4.3-2
  • M
Unchecked Return Value

<7:4.4.1-1
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.4-5
  • L
Memory Leak

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.4-5
  • L
Memory Leak

<7:4.4.1-1
  • H
Buffer Overflow

<7:4.3-2
  • M
Buffer Overflow

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Buffer Overflow

<7:4.3-2
  • M
Buffer Overflow

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Buffer Overflow

<7:4.3.2-0+deb11u2
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Buffer Overflow

<7:4.3.2-0+deb11u2
  • H
Out-of-bounds Write

<7:4.2.2-1
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Out-of-bounds Write

<7:4.3.2-0+deb11u2
  • H
Out-of-bounds Write

<7:4.3-2
  • L
Divide By Zero

<7:4.4.1-1
  • H
Buffer Overflow

<7:4.3.1-1
  • H
Buffer Overflow

<7:4.3.2-0+deb11u2
  • M
Buffer Overflow

<7:4.3-2
  • L
Divide By Zero

<7:4.3-2
  • H
Buffer Overflow

<7:4.3.2-0+deb11u2
  • L
Divide By Zero

<7:4.4.1-1
  • L
NULL Pointer Dereference

<7:4.4-5
  • L
Divide By Zero

<7:5.0.1-2
  • L
Memory Leak

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3.1-6
  • M
Out-of-bounds Write

<7:4.3.1-6
  • H
Out-of-bounds Write

<7:4.3.1-1
  • M
Use After Free

<7:4.3.1-1
  • C
Out-of-bounds Write

<7:4.2.3-1
  • C
Improper Validation of Array Index

<7:4.2.1-1
  • L
NULL Pointer Dereference

<7:4.2.1-1
  • L
Divide By Zero

<7:4.2.1-1
  • L
Use of Uninitialized Resource

<7:4.1.4-1
  • H
NULL Pointer Dereference

<7:4.1.3-1
  • H
Out-of-bounds Read

<7:4.1.3-1
  • L
Out-of-bounds Read

<7:4.1.3-1
  • M
Out-of-bounds Read

<7:4.1.3-1
  • L
Improper Validation of Array Index

<7:4.1.1-1
  • L
Reachable Assertion

<7:4.0.3-1
  • M
Out-of-bounds Read

<7:4.0.2-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:4.0.2-1
  • H
Out-of-Bounds

<7:4.0.2-1
  • M
Out-of-bounds Read

<7:4.0.2-1
  • C
Out-of-bounds Read

<7:4.0.2-1
  • M
Use After Free

<7:4.0.2-1
  • M
Divide By Zero

<7:4.0.2-1
  • M
Divide By Zero

<7:4.0.2-1
  • H
Improper Validation of Array Index

<7:3.4.3-1
  • M
Reachable Assertion

<7:4.0.2-1
  • L
NULL Pointer Dereference

<7:4.0.2-1
  • M
NULL Pointer Dereference

<7:4.0.2-1
  • H
Out-of-bounds Read

<7:3.4.3-1
  • H
Integer Overflow or Wraparound

<7:2.4.1-1
  • L
Improper Input Validation

<7:3.4.3-1
  • L
Improper Input Validation

<7:4.0.1-2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:3.4.3-1
  • L
Out-of-bounds Read

<7:3.4.3-1
  • L
Out-of-bounds Read

<7:3.4.3-1
  • M
Out-of-bounds Read

<7:3.4.3-1
  • L
Out-of-bounds Read

<7:4.0.1-2
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • L
Out-of-bounds Read

<7:3.4.2-1
  • M
Out-of-bounds Read

<7:3.4.2-1
  • M
Integer Underflow

<7:2.5.3-1
  • M
NULL Pointer Dereference

<7:3.1.1-1
  • M
NULL Pointer Dereference

<7:3.3.3-1
  • M
Out-of-bounds Read

<7:3.4.1-1
  • C
Out-of-bounds Read

<7:3.4.1-1
  • H
Out-of-Bounds

<7:2.2.1-1
  • H
Out-of-bounds Read

<7:3.4-1
  • M
Double Free

<7:3.4-1
  • H
Out-of-Bounds

<7:3.3.4-1
  • L
NULL Pointer Dereference

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Resource Exhaustion

<7:3.3.4-1
  • L
Improper Input Validation

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • H
Improper Resource Shutdown or Release

<7:2.4.1-1
  • C
CVE-2012-2773

<7:2.4.1-1
  • C
CVE-2012-2771

<7:2.4.1-1
  • C
CVE-2012-2780

<7:2.4.1-1
  • C
CVE-2012-2781

<7:2.4.1-1
  • C
CVE-2012-2778

<7:2.4.1-1
  • H
Out-of-bounds Read

<7:3.3.3-1
  • H
Improper Input Validation

<7:3.3.3-1
  • H
CVE-2017-11684

<7:2.3.1-1
  • H
Out-of-bounds Read

<7:3.3.3-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Information Exposure

<7:3.2.6-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • M
Double Free

<7:2.6.1-1
  • L
NULL Pointer Dereference

<7:2.6.1-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:3.2.4-1
  • M
Out-of-Bounds

<7:3.2.4-1
  • M
Out-of-bounds Read

<7:2.4-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • H
Out-of-Bounds

<7:3.1.3-1
  • C
Integer Overflow or Wraparound

<7:3.1.1-1
  • H
Out-of-Bounds

<7:3.2-1
  • M
Resource Management Errors

<7:3.1.4-1
  • M
Information Exposure

<7:3.1.4-1
  • M
Improper Input Validation

<7:3.1.4-1
  • H
Out-of-bounds Read

<7:3.1.4-1
  • M
Out-of-Bounds

<7:3.1.4-1
  • M
Improper Input Validation

<7:3.1.5-1
  • H
Out-of-bounds Read

<7:3.1.4-1
  • L
Resource Management Errors

<7:3.2.4-1
  • H
Out-of-Bounds

<7:3.1.2-1
  • M
NULL Pointer Dereference

<7:3.1.4-1
  • L
Resource Management Errors

<7:3.1.3-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<2.8.5-1
  • H
Out-of-Bounds

<2.8.6-1
  • H
Out-of-Bounds

<2.8.6-1
  • H
Out-of-Bounds

<2.8.6-1
  • H
Integer Overflow or Wraparound

<2.8.5-1
  • M
Out-of-Bounds

<7:2.8.6-1
  • M
Information Exposure

<7:2.8.5-1
  • M
Information Exposure

<7:2.8.5-1
  • H
Out-of-Bounds

<7:2.8.3-1
  • H
Out-of-Bounds

<7:2.8.4-1
  • H
Out-of-Bounds

<7:2.8.4-1
  • M
Out-of-Bounds

<7:2.8.3-1
  • M
Out-of-Bounds

<7:2.8.3-1
  • M
Numeric Errors

<7:2.8.3-1
  • H
Code

<7:2.8.2-1
  • H
Improper Input Validation

<7:2.8.2-1
  • H
Improper Input Validation

<7:2.8.2-1
  • M
Improper Input Validation

<7:2.8.2-1
  • M
Race Condition

<7:2.8.1-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Code

<7:2.7.2-1
  • H
Code

<7:2.7.2-1
  • H
Numeric Errors

<7:2.7.2-1
  • H
Out-of-Bounds

<7:2.7.2-1
  • H
Code

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • M
Out-of-Bounds

<7:2.5.4-1
  • M
Out-of-Bounds

<7:2.6.2-1
  • M
CVE-2015-3417

<7:2.6.1-1
  • H
CVE-2014-7933

<7:2.5.1-1
  • H
Out-of-Bounds

<7:2.4.2-1
  • H
Numeric Errors

<7:2.5.1-1
  • H
Improper Input Validation

<7:2.5.1-1
  • H
Numeric Errors

<7:2.5.1-1
  • H
Out-of-Bounds

<2.4.4-1
  • H
Out-of-Bounds

<2.4.4-1
  • H
Out-of-Bounds

<2.4.4-1
  • M
Out-of-Bounds

<2.4.4-1
  • H
Numeric Errors

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Numeric Errors

<7:2.4.3-1
  • H
Numeric Errors

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Improper Input Validation

<7:2.4.3-1
  • H
Improper Input Validation

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • L
Resource Management Errors

<7:2.4.1-1
  • M
CVE-2011-3944

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • L
Resource Management Errors

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
CVE-2013-0858

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Numeric Errors

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • C
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • H
Numeric Errors

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
CVE-2013-2277

<7:2.4.1-1
  • H
Buffer Overflow

<7:2.4.1-1
  • H
Resource Management Errors

<7:2.4.1-1
  • C
CVE-2012-2783

<7:2.4.1-1
  • C
CVE-2012-2797

<7:2.4.1-1
  • C
CVE-2012-2779

<7:2.4.1-1
  • C
CVE-2012-2784

<7:2.4.1-1
  • C
CVE-2012-2777

<7:2.4.1-1
  • C
CVE-2012-2772

<7:2.4.1-1
  • C
CVE-2012-2801

<7:2.4.1-1
  • C
Resource Management Errors

<7:2.4.1-1
  • C
CVE-2012-2804

<7:2.4.1-1
  • C
CVE-2012-2776

<7:2.4.1-1
  • C
CVE-2012-2775

<7:2.4.1-1
  • C
CVE-2012-2788

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.2.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-bounds Read

<7:2.4.1-1
  • H
Double Free

<7:2.4.1-1
  • H
Out-of-bounds Write

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • H
Arbitrary Code Injection

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • C
CVE-2011-2162

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Improper Input Validation

<7:2.4.1-1
  • H
Buffer Overflow

<7:2.4.1-1
  • M
Arbitrary Code Injection

<4:0.5.2-6
  • L
Numeric Errors

<7:2.4.1-1
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • C
Numeric Errors

<4:0.5+svn20090706-3
  • H
Numeric Errors

<4:0.5+svn20090706-3
  • H
Arbitrary Code Injection

<4:0.5+svn20090706-3
  • M
Arbitrary Code Injection

<4:0.5+svn20090706-3
  • C
Numeric Errors

<4:0.5+svn20090706-3
  • C
Out-of-Bounds

<4:0.5+svn20090706-3
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • H
CVE-2009-0385

<0.svn20080206-16
  • C
Out-of-Bounds

<0.svn20080206-14
  • C
Out-of-Bounds

<0.svn20080206-14
  • L
Resource Management Errors

<7:2.4.1-1
  • L
Improper Input Validation

<0.svn20080206-16
  • H
Out-of-Bounds

<0.svn20080206-10
  • H
CVE-2006-4800

<0.cvs20060329-1
  • M
Out-of-Bounds

<0.cvs20050918-5.1