ffmpeg vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ffmpeg package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Divide By Zero

*
  • M
Out-of-bounds Read

<7:3.2.18-0+deb9u1
  • L
Use After Free

*
  • L
Use After Free

*
  • C
Unchecked Return Value

<7:3.2.16-1+deb9u1
  • H
Reachable Assertion

<7:3.2.16-1+deb9u1
  • M
CVE-2021-3566

<7:3.2.15-0+deb9u3
  • M
Unchecked Return Value

<7:3.2.15-0+deb9u3
  • M
Memory Leak

<7:3.2.16-1+deb9u1
  • M
Memory Leak

<7:3.2.16-1+deb9u1
  • M
Memory Leak

<7:3.2.16-1+deb9u1
  • M
Memory Leak

<7:3.2.16-1+deb9u1
  • L
Memory Leak

*
  • L
Memory Leak

*
  • H
Out-of-bounds Write

<7:3.2.15-0+deb9u3
  • M
Memory Leak

<7:3.2.16-1+deb9u1
  • L
Memory Leak

*
  • M
Memory Leak

<7:3.2.16-1+deb9u1
  • L
Memory Leak

*
  • M
Memory Leak

<7:3.2.16-1+deb9u1
  • M
Buffer Overflow

<7:3.2.15-0+deb9u3
  • M
Buffer Overflow

<7:3.2.15-0+deb9u3
  • H
Out-of-bounds Write

*
  • H
Out-of-bounds Write

<7:3.2.15-0+deb9u3
  • M
Buffer Overflow

<7:3.2.15-0+deb9u3
  • H
Out-of-bounds Write

<7:3.2.15-0+deb9u3
  • H
Out-of-bounds Write

<7:3.2.15-0+deb9u3
  • H
Out-of-bounds Write

<7:3.2.15-0+deb9u3
  • H
Out-of-bounds Write

<7:3.2.15-0+deb9u3
  • H
Out-of-bounds Write

<7:3.2.15-0+deb9u3
  • M
Divide By Zero

<7:3.2.16-1+deb9u1
  • H
Buffer Overflow

<7:3.2.15-0+deb9u3
  • M
Buffer Overflow

<7:3.2.15-0+deb9u3
  • H
Buffer Overflow

<7:3.2.15-0+deb9u3
  • M
Divide By Zero

<7:3.2.16-1+deb9u1
  • M
Divide By Zero

<7:3.2.16-1+deb9u1
  • H
Memory Leak

<7:3.2.16-1+deb9u1
  • H
Out-of-bounds Write

<7:3.2.15-0+deb9u2
  • M
Use After Free

<7:3.2.15-0+deb9u1
  • C
Improper Validation of Array Index

<7:3.2.15-0+deb9u1
  • C
NULL Pointer Dereference

<7:3.2.15-0+deb9u2
  • M
Divide By Zero

<7:3.2.15-0+deb9u1
  • C
Use of Uninitialized Resource

<7:3.2.14-1~deb9u1
  • H
NULL Pointer Dereference

<7:3.2.14-1~deb9u1
  • M
Out-of-bounds Read

<7:3.2.14-1~deb9u1
  • H
Reachable Assertion

<7:3.2.14-1~deb9u1
  • C
Out-of-bounds Read

<7:3.2.11-1~deb9u1
  • H
Out-of-Bounds

<7:3.2.14-1~deb9u1
  • M
Use After Free

<7:3.2.11-1~deb9u1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:3.2.11-1~deb9u1
  • M
Divide By Zero

<7:3.2.12-1~deb9u1
  • M
Divide By Zero

<7:3.2.11-1~deb9u1
  • H
Improper Validation of Array Index

<7:3.2.11-1~deb9u1
  • H
Out-of-bounds Read

<7:3.2.11-1~deb9u1
  • H
Integer Overflow or Wraparound

<7:2.4.1-1
  • M
Improper Input Validation

<7:3.2.11-1~deb9u1
  • M
Out-of-bounds Read

<7:3.2.11-1~deb9u1
  • M
Out-of-bounds Read

<7:3.2.11-1~deb9u1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-bounds Read

<7:3.2.11-1~deb9u1
  • M
Out-of-bounds Read

<7:3.2.11-1~deb9u1
  • M
Integer Underflow

<7:2.5.3-1
  • M
NULL Pointer Dereference

<7:3.1.1-1
  • M
NULL Pointer Dereference

<7:3.2.7-1~deb9u1
  • M
Out-of-bounds Read

<7:3.2.10-1~deb9u1
  • C
Out-of-bounds Read

<7:3.2.9-1~deb9u1
  • H
Out-of-Bounds

<7:2.2.1-1
  • H
Out-of-bounds Read

<7:3.2.9-1~deb9u1
  • M
Double Free

<7:3.2.9-1~deb9u1
  • H
Out-of-Bounds

<7:3.2.8-1~deb9u1
  • H
NULL Pointer Dereference

<7:3.2.8-1~deb9u1
  • M
Excessive Iteration

<7:3.2.8-1~deb9u1
  • M
Resource Exhaustion

<7:3.2.8-1~deb9u1
  • H
Improper Input Validation

<7:3.2.8-1~deb9u1
  • M
Excessive Iteration

<7:3.2.8-1~deb9u1
  • M
Excessive Iteration

<7:3.2.8-1~deb9u1
  • M
Excessive Iteration

<7:3.2.8-1~deb9u1
  • M
Excessive Iteration

<7:3.2.8-1~deb9u1
  • M
Excessive Iteration

<7:3.2.8-1~deb9u1
  • M
Excessive Iteration

<7:3.2.8-1~deb9u1
  • M
Excessive Iteration

<7:3.2.8-1~deb9u1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:3.2.8-1~deb9u1
  • H
Improper Resource Shutdown or Release

<7:2.4.1-1
  • C
CVE-2012-2778

<7:2.4.1-1
  • C
CVE-2012-2773

<7:2.4.1-1
  • C
CVE-2012-2780

<7:2.4.1-1
  • C
CVE-2012-2771

<7:2.4.1-1
  • C
CVE-2012-2781

<7:2.4.1-1
  • H
Out-of-bounds Read

<7:3.2.7-1~deb9u1
  • H
Improper Input Validation

<7:3.2.7-1~deb9u1
  • H
CVE-2017-11684

<7:2.3.1-1
  • H
Out-of-bounds Read

<7:3.2.7-1~deb9u1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Information Exposure

<7:3.2.7-1~deb9u1
  • H
Out-of-Bounds

<7:3.2.5-1
  • M
Double Free

<7:2.6.1-1
  • L
NULL Pointer Dereference

<7:2.6.1-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:3.2.4-1
  • M
Out-of-Bounds

<7:3.2.4-1
  • M
Out-of-bounds Read

<7:2.4-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • H
Out-of-Bounds

<7:3.1.3-1
  • C
Integer Overflow or Wraparound

<7:3.1.1-1
  • H
Out-of-Bounds

<7:3.2-1
  • L
Resource Management Errors

<7:3.1.3-1
  • L
Resource Management Errors

<7:3.2.4-1
  • M
Improper Input Validation

<7:3.1.4-1
  • M
Out-of-Bounds

<7:3.1.4-1
  • M
NULL Pointer Dereference

<7:3.1.4-1
  • M
Improper Input Validation

<7:3.1.5-1
  • H
Out-of-Bounds

<7:3.1.2-1
  • M
Resource Management Errors

<7:3.1.4-1
  • M
Information Exposure

<7:3.1.4-1
  • H
Out-of-bounds Read

<7:3.1.4-1
  • H
Out-of-bounds Read

<7:3.1.4-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<2.8.6-1
  • H
Out-of-Bounds

<2.8.6-1
  • H
Out-of-Bounds

<2.8.6-1
  • H
Integer Overflow or Wraparound

<2.8.5-1
  • H
Out-of-Bounds

<2.8.5-1
  • M
Out-of-Bounds

<7:2.8.6-1
  • M
Information Exposure

<7:2.8.5-1
  • M
Information Exposure

<7:2.8.5-1
  • H
Out-of-Bounds

<7:2.8.4-1
  • H
Out-of-Bounds

<7:2.8.4-1
  • H
Out-of-Bounds

<7:2.8.3-1
  • M
Numeric Errors

<7:2.8.3-1
  • M
Out-of-Bounds

<7:2.8.3-1
  • M
Out-of-Bounds

<7:2.8.3-1
  • H
Improper Input Validation

<7:2.8.2-1
  • H
Improper Input Validation

<7:2.8.2-1
  • H
Code

<7:2.8.2-1
  • M
Improper Input Validation

<7:2.8.2-1
  • M
Race Condition

<7:2.8.1-1
  • H
Code

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Code

<7:2.7.2-1
  • H
Code

<7:2.7.2-1
  • H
Numeric Errors

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Out-of-Bounds

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.7.2-1
  • M
Out-of-Bounds

<7:2.5.4-1
  • M
Out-of-Bounds

<7:2.6.2-1
  • M
CVE-2015-3417

<7:2.6.1-1
  • H
CVE-2014-7933

<7:2.5.1-1
  • H
Out-of-Bounds

<7:2.4.2-1
  • H
Numeric Errors

<7:2.5.1-1
  • H
Numeric Errors

<7:2.5.1-1
  • H
Improper Input Validation

<7:2.5.1-1
  • H
Out-of-Bounds

<2.4.4-1
  • H
Out-of-Bounds

<2.4.4-1
  • M
Out-of-Bounds

<2.4.4-1
  • H
Out-of-Bounds

<2.4.4-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Improper Input Validation

<7:2.4.3-1
  • H
Numeric Errors

<7:2.4.3-1
  • H
Numeric Errors

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Improper Input Validation

<7:2.4.3-1
  • H
Numeric Errors

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Out-of-Bounds

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Resource Management Errors

<7:2.4.1-1
  • M
CVE-2011-3944

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • L
Resource Management Errors

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
CVE-2013-0858

<7:2.4.1-1
  • H
Numeric Errors

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • C
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Numeric Errors

<7:2.4.1-1
  • H
CVE-2013-2277

<7:2.4.1-1
  • H
Buffer Overflow

<7:2.4.1-1
  • H
Resource Management Errors

<7:2.4.1-1
  • C
CVE-2012-2797

<7:2.4.1-1
  • C
CVE-2012-2772

<7:2.4.1-1
  • C
CVE-2012-2777

<7:2.4.1-1
  • C
CVE-2012-2804

<7:2.4.1-1
  • C
CVE-2012-2783

<7:2.4.1-1
  • C
CVE-2012-2801

<7:2.4.1-1
  • C
CVE-2012-2784

<7:2.4.1-1
  • C
CVE-2012-2775

<7:2.4.1-1
  • C
Resource Management Errors

<7:2.4.1-1
  • C
CVE-2012-2788

<7:2.4.1-1
  • C
CVE-2012-2779

<7:2.4.1-1
  • C
CVE-2012-2776

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.2.1-1
  • H
Double Free

<7:2.4.1-1
  • M
Out-of-bounds Read

<7:2.4.1-1
  • H
Out-of-bounds Write

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • H
Arbitrary Code Injection

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • C
CVE-2011-2162

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Improper Input Validation

<7:2.4.1-1
  • H
Buffer Overflow

<7:2.4.1-1
  • M
Arbitrary Code Injection

<4:0.5.2-6
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • L
Numeric Errors

<7:2.4.1-1
  • C
Numeric Errors

<4:0.5+svn20090706-3
  • H
Arbitrary Code Injection

<4:0.5+svn20090706-3
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • H
Numeric Errors

<4:0.5+svn20090706-3
  • C
Out-of-Bounds

<4:0.5+svn20090706-3
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • C
Numeric Errors

<4:0.5+svn20090706-3
  • M
Arbitrary Code Injection

<4:0.5+svn20090706-3
  • H
CVE-2009-0385

<0.svn20080206-16
  • C
Out-of-Bounds

<0.svn20080206-14
  • C
Out-of-Bounds

<0.svn20080206-14
  • L
Resource Management Errors

<7:2.4.1-1
  • L
Improper Input Validation

<0.svn20080206-16
  • H
Out-of-Bounds

<0.svn20080206-10
  • H
CVE-2006-4800

<0.cvs20060329-1
  • M
Out-of-Bounds

<0.cvs20050918-5.1