ffmpeg vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ffmpeg package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-36616

<7:7.0.1-3
  • L
CVE-2024-36619

<7:7.1-3
  • L
CVE-2024-35366

<7:7.0.1-3
  • L
CVE-2024-36618

<7:7.0.1-3
  • L
CVE-2024-36615

<7:7.1-3
  • L
CVE-2024-36617

<7:7.0.1-3
  • L
CVE-2024-35368

<7:7.1-3
  • L
CVE-2024-35367

<7:7.0.1-3
  • L
CVE-2024-35369

<7:7.0.1-3
  • L
CVE-2024-7055

<7:7.0.2-1
  • H
Out-of-bounds Write

<7:6.0-4
  • L
CVE-2024-32228

<7:7.0.1-3
  • H
Buffer Overflow

<7:7.0.1-3
  • L
CVE-2023-51794

<7:7.0.1-3
  • L
CVE-2023-51796

<7:7.0.1-3
  • L
CVE-2023-51798

<7:7.0.1-3
  • L
CVE-2023-51791

<7:7.0.1-3
  • L
CVE-2023-49501

<7:7.0.1-3
  • L
CVE-2023-49502

<7:7.0.1-3
  • L
CVE-2023-50008

<7:7.0.1-3
  • L
CVE-2023-50010

<7:7.0.1-3
  • L
CVE-2023-51795

<7:7.0.1-3
  • L
CVE-2023-50007

<7:7.0.1-3
  • L
CVE-2023-50009

<7:7.0.1-3
  • L
CVE-2023-51797

<7:7.0.1-3
  • L
CVE-2023-51793

<7:7.0.1-3
  • L
CVE-2024-31578

<7:7.0.1-3
  • L
CVE-2024-31581

<7:7.0.1-3
  • L
CVE-2024-31582

<7:7.0.1-3
  • L
CVE-2024-31585

<7:7.0.1-3
  • L
CVE-2023-49528

<7:7.0.1-3
  • C
Integer Overflow or Wraparound

<7:6.1-1
  • H
Integer Overflow or Wraparound

<7:6.1-1
  • C
Integer Overflow or Wraparound

<7:6.1-1
  • M
Integer Overflow or Wraparound

<7:4.4-5
  • H
CVE-2022-4907

<7:6.0-4
  • H
Use After Free

<7:5.1.2-1
  • M
NULL Pointer Dereference

<7:5.1-1
  • H
NULL Pointer Dereference

<7:5.1-1
  • H
Out-of-Bounds

<7:5.1.3-1
  • H
Out-of-Bounds

<7:5.1.3-1
  • H
Integer Overflow or Wraparound

<7:5.1.1-1
  • M
Integer Overflow or Wraparound

<7:4.4.2-1
  • M
Insufficient Verification of Data Authenticity

<7:4.3.1-1
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • H
Buffer Overflow

<7:4.3-2
  • H
NULL Pointer Dereference

<7:4.3-2
  • H
Divide By Zero

<7:4.3-2
  • M
Out-of-bounds Read

<7:4.2.2-1
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • M
Use After Free

<7:4.4-5
  • H
Use After Free

<7:4.4-5
  • C
Unchecked Return Value

<7:4.4.1-1
  • L
Reachable Assertion

<7:4.4.1-1
  • M
CVE-2021-3566

<7:4.3-2
  • M
Unchecked Return Value

<7:4.4.1-1
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.4-5
  • L
Memory Leak

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.4-5
  • L
Memory Leak

<7:4.4.1-1
  • H
Buffer Overflow

<7:4.3-2
  • M
Buffer Overflow

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Buffer Overflow

<7:4.3-2
  • M
Buffer Overflow

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Buffer Overflow

<7:4.3.2-0+deb11u2
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Buffer Overflow

<7:4.3.2-0+deb11u2
  • H
Out-of-bounds Write

<7:4.2.2-1
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Out-of-bounds Write

<7:4.3.2-0+deb11u2
  • H
Out-of-bounds Write

<7:4.3-2
  • L
Divide By Zero

<7:4.4.1-1
  • H
Buffer Overflow

<7:4.3.1-1
  • H
Buffer Overflow

<7:4.3.2-0+deb11u2
  • M
Buffer Overflow

<7:4.3-2
  • L
Divide By Zero

<7:4.3-2
  • H
Buffer Overflow

<7:4.3.2-0+deb11u2
  • L
Divide By Zero

<7:4.4.1-1
  • L
NULL Pointer Dereference

<7:4.4-5
  • L
Divide By Zero

<7:5.0.1-2
  • L
Memory Leak

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3.1-6
  • M
Out-of-bounds Write

<7:4.3.1-6
  • H
Out-of-bounds Write

<7:4.3.1-1
  • M
Use After Free

<7:4.3.1-1
  • C
Out-of-bounds Write

<7:4.2.3-1
  • C
Improper Validation of Array Index

<7:4.2.1-1
  • L
NULL Pointer Dereference

<7:4.2.1-1
  • L
Divide By Zero

<7:4.2.1-1
  • L
Use of Uninitialized Resource

<7:4.1.4-1
  • H
NULL Pointer Dereference

<7:4.1.3-1
  • H
Out-of-bounds Read

<7:4.1.3-1
  • M
Out-of-bounds Read

<7:4.1.3-1
  • L
Out-of-bounds Read

<7:4.1.3-1
  • L
Improper Validation of Array Index

<7:4.1.1-1
  • L
Reachable Assertion

<7:4.0.3-1
  • C
Out-of-bounds Read

<7:4.0.2-1
  • M
Use After Free

<7:4.0.2-1
  • M
Out-of-bounds Read

<7:4.0.2-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:4.0.2-1
  • M
Out-of-bounds Read

<7:4.0.2-1
  • H
Out-of-Bounds

<7:4.0.2-1
  • M
Divide By Zero

<7:4.0.2-1
  • M
Divide By Zero

<7:4.0.2-1
  • H
Improper Validation of Array Index

<7:3.4.3-1
  • M
Reachable Assertion

<7:4.0.2-1
  • L
NULL Pointer Dereference

<7:4.0.2-1
  • M
NULL Pointer Dereference

<7:4.0.2-1
  • H
Out-of-bounds Read

<7:3.4.3-1
  • H
Integer Overflow or Wraparound

<7:2.4.1-1
  • L
Improper Input Validation

<7:4.0.1-2
  • L
Improper Input Validation

<7:3.4.3-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:3.4.3-1
  • L
Out-of-bounds Read

<7:3.4.3-1
  • L
Out-of-bounds Read

<7:3.4.3-1
  • M
Out-of-bounds Read

<7:3.4.3-1
  • L
Out-of-bounds Read

<7:4.0.1-2
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • L
Out-of-bounds Read

<7:3.4.2-1
  • M
Out-of-bounds Read

<7:3.4.2-1
  • M
Integer Underflow

<7:2.5.3-1
  • M
NULL Pointer Dereference

<7:3.1.1-1
  • M
NULL Pointer Dereference

<7:3.3.3-1
  • M
Out-of-bounds Read

<7:3.4.1-1
  • C
Out-of-bounds Read

<7:3.4.1-1
  • H
Out-of-Bounds

<7:2.2.1-1
  • H
Out-of-bounds Read

<7:3.4-1
  • M
Double Free

<7:3.4-1
  • H
Out-of-Bounds

<7:3.3.4-1
  • L
NULL Pointer Dereference

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Resource Exhaustion

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Improper Input Validation

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • H
Improper Resource Shutdown or Release

<7:2.4.1-1
  • C
CVE-2012-2778

<7:2.4.1-1
  • C
CVE-2012-2773

<7:2.4.1-1
  • C
CVE-2012-2771

<7:2.4.1-1
  • C
CVE-2012-2781

<7:2.4.1-1
  • C
CVE-2012-2780

<7:2.4.1-1
  • H
Out-of-bounds Read

<7:3.3.3-1
  • H
Improper Input Validation

<7:3.3.3-1
  • H
CVE-2017-11684

<7:2.3.1-1
  • H
Out-of-bounds Read

<7:3.3.3-1
  • H
Information Exposure

<7:3.2.6-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • M
Double Free

<7:2.6.1-1
  • L
NULL Pointer Dereference

<7:2.6.1-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:3.2.4-1
  • M
Out-of-Bounds

<7:3.2.4-1
  • M
Out-of-bounds Read

<7:2.4-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • H
Out-of-Bounds

<7:3.1.3-1
  • C
Integer Overflow or Wraparound

<7:3.1.1-1
  • H
Out-of-Bounds

<7:3.2-1
  • H
Out-of-bounds Read

<7:3.1.4-1
  • M
Improper Input Validation

<7:3.1.4-1
  • M
NULL Pointer Dereference

<7:3.1.4-1
  • H
Out-of-Bounds

<7:3.1.2-1
  • M
Information Exposure

<7:3.1.4-1
  • H
Out-of-bounds Read

<7:3.1.4-1
  • M
Improper Input Validation

<7:3.1.5-1
  • M
Resource Management Errors

<7:3.1.4-1
  • L
Resource Management Errors

<7:3.2.4-1
  • L
Resource Management Errors

<7:3.1.3-1
  • M
Out-of-Bounds

<7:3.1.4-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<2.8.6-1
  • H
Integer Overflow or Wraparound

<2.8.5-1
  • H
Out-of-Bounds

<2.8.5-1
  • H
Out-of-Bounds

<2.8.6-1
  • H
Out-of-Bounds

<2.8.6-1
  • M
Out-of-Bounds

<7:2.8.6-1
  • M
Information Exposure

<7:2.8.5-1
  • M
Information Exposure

<7:2.8.5-1
  • H
Out-of-Bounds

<7:2.8.4-1
  • H
Out-of-Bounds

<7:2.8.4-1
  • H
Out-of-Bounds

<7:2.8.3-1
  • M
Numeric Errors

<7:2.8.3-1
  • M
Out-of-Bounds

<7:2.8.3-1
  • M
Out-of-Bounds

<7:2.8.3-1
  • H
Improper Input Validation

<7:2.8.2-1
  • M
Improper Input Validation

<7:2.8.2-1
  • H
Code

<7:2.8.2-1
  • H
Improper Input Validation

<7:2.8.2-1
  • M
Race Condition

<7:2.8.1-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Numeric Errors

<7:2.7.2-1
  • H
Code

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Code

<7:2.7.2-1
  • H
Code

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Out-of-Bounds

<7:2.7.2-1
  • M
Out-of-Bounds

<7:2.5.4-1
  • M
Out-of-Bounds

<7:2.6.2-1
  • M
CVE-2015-3417

<7:2.6.1-1
  • H
Out-of-Bounds

<7:2.4.2-1
  • H
CVE-2014-7933

<7:2.5.1-1
  • H
Numeric Errors

<7:2.5.1-1
  • H
Numeric Errors

<7:2.5.1-1
  • H
Improper Input Validation

<7:2.5.1-1
  • H
Out-of-Bounds

<2.4.4-1
  • M
Out-of-Bounds

<2.4.4-1
  • H
Out-of-Bounds

<2.4.4-1
  • H
Out-of-Bounds

<2.4.4-1
  • H
Improper Input Validation

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Improper Input Validation

<7:2.4.3-1
  • H
Numeric Errors

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Numeric Errors

<7:2.4.3-1
  • H
Numeric Errors

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Resource Management Errors

<7:2.4.1-1
  • M
CVE-2011-3944

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • L
Resource Management Errors

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
CVE-2013-0858

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Numeric Errors

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • C
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • H
Numeric Errors

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
CVE-2013-2277

<7:2.4.1-1
  • H
Buffer Overflow

<7:2.4.1-1
  • H
Resource Management Errors

<7:2.4.1-1
  • C
Resource Management Errors

<7:2.4.1-1
  • C
CVE-2012-2797

<7:2.4.1-1
  • C
CVE-2012-2784

<7:2.4.1-1
  • C
CVE-2012-2783

<7:2.4.1-1
  • C
CVE-2012-2775

<7:2.4.1-1
  • C
CVE-2012-2804

<7:2.4.1-1
  • C
CVE-2012-2779

<7:2.4.1-1
  • C
CVE-2012-2788

<7:2.4.1-1
  • C
CVE-2012-2776

<7:2.4.1-1
  • C
CVE-2012-2772

<7:2.4.1-1
  • C
CVE-2012-2777

<7:2.4.1-1
  • C
CVE-2012-2801

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.2.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-bounds Read

<7:2.4.1-1
  • H
Double Free

<7:2.4.1-1
  • H
Out-of-bounds Write

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • H
Arbitrary Code Injection

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • C
CVE-2011-2162

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Improper Input Validation

<7:2.4.1-1
  • H
Buffer Overflow

<7:2.4.1-1
  • M
Arbitrary Code Injection

<4:0.5.2-6
  • H
Numeric Errors

<4:0.5+svn20090706-3
  • C
Numeric Errors

<4:0.5+svn20090706-3
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • C
Numeric Errors

<4:0.5+svn20090706-3
  • M
Arbitrary Code Injection

<4:0.5+svn20090706-3
  • L
Numeric Errors

<7:2.4.1-1
  • C
Out-of-Bounds

<4:0.5+svn20090706-3
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • H
Arbitrary Code Injection

<4:0.5+svn20090706-3
  • H
CVE-2009-0385

<0.svn20080206-16
  • C
Out-of-Bounds

<0.svn20080206-14
  • C
Out-of-Bounds

<0.svn20080206-14
  • L
Resource Management Errors

<7:2.4.1-1
  • L
Improper Input Validation

<0.svn20080206-16
  • H
Out-of-Bounds

<0.svn20080206-10
  • H
CVE-2006-4800

<0.cvs20060329-1
  • M
Out-of-Bounds

<0.cvs20050918-5.1