Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-1999010 (GCVE-0-2018-1999010)
Vulnerability from cvelistv5 – Published: 2018-07-23 15:00 – Updated: 2024-08-05 12:47- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T12:47:57.555Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "104896",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/104896"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8"
},
{
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"dateAssigned": "2018-07-20T00:00:00.000Z",
"datePublic": "2018-07-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-01-08T10:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "104896",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/104896"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8"
},
{
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-07-20T20:44:32.975346",
"DATE_REQUESTED": "2018-07-13T15:58:45",
"ID": "CVE-2018-1999010",
"REQUESTER": "paulcher@icloud.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "104896",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104896"
},
{
"name": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8",
"refsource": "CONFIRM",
"url": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8"
},
{
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-1999010",
"datePublished": "2018-07-23T15:00:00.000Z",
"dateReserved": "2018-07-13T00:00:00.000Z",
"dateUpdated": "2024-08-05T12:47:57.555Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.4.3\", \"matchCriteriaId\": \"19ED68BA-9916-415D-AB95-6F3246D52E65\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later.\"}, {\"lang\": \"es\", \"value\": \"FFmpeg antes del commit con ID cced03dd667a5df6df8fd40d8de0bff477ee02e8 contiene m\\u00faltiples vulnerabilidades de acceso fuera de array en el protocolo mms que puede resultar en que los atacantes accedan a datos fuera de l\\u00edmites. Este ataque parece ser explotable mediante conectividad de red. La vulnerabilidad parece haber sido solucionada en cced03dd667a5df6df8fd40d8de0bff477ee02e8 y siguientes.\"}]",
"id": "CVE-2018-1999010",
"lastModified": "2024-11-21T03:57:02.590",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-07-23T15:29:00.297",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/104896\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/104896\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-1999010\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-07-23T15:29:00.297\",\"lastModified\":\"2024-11-21T03:57:02.590\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later.\"},{\"lang\":\"es\",\"value\":\"FFmpeg antes del commit con ID cced03dd667a5df6df8fd40d8de0bff477ee02e8 contiene m\u00faltiples vulnerabilidades de acceso fuera de array en el protocolo mms que puede resultar en que los atacantes accedan a datos fuera de l\u00edmites. Este ataque parece ser explotable mediante conectividad de red. La vulnerabilidad parece haber sido solucionada en cced03dd667a5df6df8fd40d8de0bff477ee02e8 y siguientes.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.4.3\",\"matchCriteriaId\":\"19ED68BA-9916-415D-AB95-6F3246D52E65\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/104896\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
cleanstart-2026-ps82605
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ffmpeg package. Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a denial of service (DoS) via the ref_pic_list_struct function in libavcodec/evc_ps. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ffmpeg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ffmpeg package. Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a denial of service (DoS) via the ref_pic_list_struct function in libavcodec/evc_ps. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-PS82605",
"modified": "2026-02-03T13:35:45Z",
"published": "2026-02-06T01:09:01.544353Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-PS82605.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-14058"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-14225"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-10001"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-12458"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-12459"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-12460"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13300"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13301"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13302"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13303"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13304"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13305"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14394"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14395"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-15822"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999010"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999011"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999012"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999013"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999014"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999015"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-6912"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-7557"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-7751"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-7757"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-9841"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1000016"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-11338"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-11339"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-17539"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-17542"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-9718"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-9721"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-12284"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-13904"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14212"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-20446"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-20450"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-20453"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-21041"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22015"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22019"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22021"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22037"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22038"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22042"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-24020"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-35964"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-35965"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-30123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-33815"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-38114"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-38171"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-38291"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3965"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-46407"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-47342"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-47470"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14058"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14225"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10001"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12458"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12459"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12460"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13300"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13301"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13302"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13303"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13304"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13305"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14394"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14395"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15822"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999010"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999011"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999012"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999013"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999014"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999015"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6912"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7557"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7751"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9841"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1000016"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11338"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11339"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17539"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17542"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9718"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9721"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12284"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13904"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14212"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-20446"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-20450"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-20453"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-21041"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22015"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22019"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22021"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22037"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22038"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22042"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24020"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35964"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35965"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33815"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38114"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38171"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38291"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3965"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46407"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47342"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47470"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ...",
"upstream": [
"CVE-2017-14058",
"CVE-2017-14225",
"CVE-2018-10001",
"CVE-2018-12458",
"CVE-2018-12459",
"CVE-2018-12460",
"CVE-2018-13300",
"CVE-2018-13301",
"CVE-2018-13302",
"CVE-2018-13303",
"CVE-2018-13304",
"CVE-2018-13305",
"CVE-2018-14394",
"CVE-2018-14395",
"CVE-2018-15822",
"CVE-2018-1999010",
"CVE-2018-1999011",
"CVE-2018-1999012",
"CVE-2018-1999013",
"CVE-2018-1999014",
"CVE-2018-1999015",
"CVE-2018-6912",
"CVE-2018-7557",
"CVE-2018-7751",
"CVE-2018-7757",
"CVE-2018-9841",
"CVE-2019-1000016",
"CVE-2019-11338",
"CVE-2019-11339",
"CVE-2019-12730",
"CVE-2019-17539",
"CVE-2019-17542",
"CVE-2019-9718",
"CVE-2019-9721",
"CVE-2020-12284",
"CVE-2020-13904",
"CVE-2020-14212",
"CVE-2020-20446",
"CVE-2020-20450",
"CVE-2020-20453",
"CVE-2020-21041",
"CVE-2020-22015",
"CVE-2020-22019",
"CVE-2020-22021",
"CVE-2020-22037",
"CVE-2020-22038",
"CVE-2020-22042",
"CVE-2020-24020",
"CVE-2020-35964",
"CVE-2020-35965",
"CVE-2021-30123",
"CVE-2021-33815",
"CVE-2021-38114",
"CVE-2021-38171",
"CVE-2021-38291",
"CVE-2022-3965",
"CVE-2023-46407",
"CVE-2023-47342",
"CVE-2023-47470"
]
}
cleanstart-2026-xe32069
Vulnerability from cleanstart
Multiple security vulnerabilities affect the ffmpeg package. Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a denial of service (DoS) via the ref_pic_list_struct function in libavcodec/evc_ps. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "ffmpeg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.1-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the ffmpeg package. Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a denial of service (DoS) via the ref_pic_list_struct function in libavcodec/evc_ps. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-XE32069",
"modified": "2026-02-03T13:35:45Z",
"published": "2026-02-06T01:10:32.733224Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-XE32069.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-14058"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2017-14225"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-10001"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-12458"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-12459"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-12460"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13300"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13301"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13302"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13303"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13304"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-13305"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14394"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-14395"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-15822"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999010"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999011"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999012"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999013"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999014"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-1999015"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-6912"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-7557"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-7751"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-7757"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2018-9841"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-1000016"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-11338"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-11339"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-12730"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-17539"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-17542"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-9718"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-9721"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-12284"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-13904"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14212"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-20446"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-20450"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-20453"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-21041"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22015"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22019"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22021"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22037"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22038"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-22042"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-24020"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-35964"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-35965"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-30123"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-33815"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-38114"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-38171"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-38291"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3965"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-46407"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-47342"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-47470"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14058"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14225"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10001"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12458"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12459"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12460"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13300"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13301"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13302"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13303"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13304"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13305"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14394"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14395"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15822"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999010"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999011"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999012"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999013"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999014"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999015"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6912"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7557"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7751"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9841"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1000016"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11338"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11339"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12730"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17539"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17542"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9718"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9721"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12284"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13904"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14212"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-20446"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-20450"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-20453"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-21041"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22015"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22019"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22021"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22037"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22038"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-22042"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24020"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35964"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35965"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30123"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33815"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38114"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38171"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38291"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3965"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46407"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47342"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47470"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ...",
"upstream": [
"CVE-2017-14058",
"CVE-2017-14225",
"CVE-2018-10001",
"CVE-2018-12458",
"CVE-2018-12459",
"CVE-2018-12460",
"CVE-2018-13300",
"CVE-2018-13301",
"CVE-2018-13302",
"CVE-2018-13303",
"CVE-2018-13304",
"CVE-2018-13305",
"CVE-2018-14394",
"CVE-2018-14395",
"CVE-2018-15822",
"CVE-2018-1999010",
"CVE-2018-1999011",
"CVE-2018-1999012",
"CVE-2018-1999013",
"CVE-2018-1999014",
"CVE-2018-1999015",
"CVE-2018-6912",
"CVE-2018-7557",
"CVE-2018-7751",
"CVE-2018-7757",
"CVE-2018-9841",
"CVE-2019-1000016",
"CVE-2019-11338",
"CVE-2019-11339",
"CVE-2019-12730",
"CVE-2019-17539",
"CVE-2019-17542",
"CVE-2019-9718",
"CVE-2019-9721",
"CVE-2020-12284",
"CVE-2020-13904",
"CVE-2020-14212",
"CVE-2020-20446",
"CVE-2020-20450",
"CVE-2020-20453",
"CVE-2020-21041",
"CVE-2020-22015",
"CVE-2020-22019",
"CVE-2020-22021",
"CVE-2020-22037",
"CVE-2020-22038",
"CVE-2020-22042",
"CVE-2020-24020",
"CVE-2020-35964",
"CVE-2020-35965",
"CVE-2021-30123",
"CVE-2021-33815",
"CVE-2021-38114",
"CVE-2021-38171",
"CVE-2021-38291",
"CVE-2022-3965",
"CVE-2023-46407",
"CVE-2023-47342",
"CVE-2023-47470"
]
}
GHSA-463V-8HM6-RVHP
Vulnerability from github – Published: 2022-05-14 01:14 – Updated: 2022-05-14 01:14FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later.
{
"affected": [],
"aliases": [
"CVE-2018-1999010"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-07-23T15:29:00Z",
"severity": "CRITICAL"
},
"details": "FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later.",
"id": "GHSA-463v-8hm6-rvhp",
"modified": "2022-05-14T01:14:55Z",
"published": "2022-05-14T01:14:55Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999010"
},
{
"type": "WEB",
"url": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/104896"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2019-02939
Vulnerability from cnvd - Published: 2019-01-25厂商已发布漏洞修复程序,请及时关注更新: https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8
| Name | FFmpeg Ffmpeg <commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 |
|---|
{
"bids": {
"bid": {
"bidNumber": "104896"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-1999010"
}
},
"description": "FFmpeg\u662fFFmpeg\u56e2\u961f\u7684\u4e00\u5957\u53ef\u5f55\u5236\u3001\u8f6c\u6362\u4ee5\u53ca\u6d41\u5316\u97f3\u89c6\u9891\u7684\u5b8c\u6574\u89e3\u51b3\u65b9\u6848\u3002\n\nFFmpeg commit cced03dd667a5df6df8fd40d8de0bff477ee02e8\u4e4b\u524d\u7248\u672c\u4e2d\u7684mms\u534f\u8bae\u591a\u4e2a\u6570\u7ec4\u5b58\u5728\u8d8a\u754c\u8bbf\u95ee\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5d29\u6e83\uff09\u3002",
"discovererName": "Paul Ch",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-02939",
"openTime": "2019-01-25",
"patchDescription": "FFmpeg\u662fFFmpeg\u56e2\u961f\u7684\u4e00\u5957\u53ef\u5f55\u5236\u3001\u8f6c\u6362\u4ee5\u53ca\u6d41\u5316\u97f3\u89c6\u9891\u7684\u5b8c\u6574\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\nFFmpeg commit cced03dd667a5df6df8fd40d8de0bff477ee02e8\u4e4b\u524d\u7248\u672c\u4e2d\u7684mms\u534f\u8bae\u591a\u4e2a\u6570\u7ec4\u5b58\u5728\u8d8a\u754c\u8bbf\u95ee\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5d29\u6e83\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "FFmpeg\u8d8a\u754c\u8bbf\u95ee\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "FFmpeg Ffmpeg \u003ccommit cced03dd667a5df6df8fd40d8de0bff477ee02e8"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999010",
"serverity": "\u9ad8",
"submitTime": "2018-07-24",
"title": "FFmpeg\u8d8a\u754c\u8bbf\u95ee\u6f0f\u6d1e"
}
GSD-2018-1999010
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-1999010",
"description": "FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later.",
"id": "GSD-2018-1999010",
"references": [
"https://www.suse.com/security/cve/CVE-2018-1999010.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-1999010"
],
"details": "FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later.",
"id": "GSD-2018-1999010",
"modified": "2023-12-13T01:22:43.761282Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"DATE_ASSIGNED": "2018-07-20T20:44:32.975346",
"DATE_REQUESTED": "2018-07-13T15:58:45",
"ID": "CVE-2018-1999010",
"REQUESTER": "paulcher@icloud.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "104896",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104896"
},
{
"name": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8",
"refsource": "CONFIRM",
"url": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8"
},
{
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.4.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-1999010"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8"
},
{
"name": "104896",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104896"
},
{
"name": "[debian-lts-announce] 20190107 [SECURITY] [DLA 1630-1] libav security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-03-27T19:11Z",
"publishedDate": "2018-07-23T15:29Z"
}
}
}
FKIE_CVE-2018-1999010
Vulnerability from fkie_nvd - Published: 2018-07-23 15:29 - Updated: 2024-11-21 03:57| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.securityfocus.com/bid/104896 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8 | Patch, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104896 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| ffmpeg | ffmpeg | * | |
| debian | debian_linux | 8.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19ED68BA-9916-415D-AB95-6F3246D52E65",
"versionEndExcluding": "3.4.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later."
},
{
"lang": "es",
"value": "FFmpeg antes del commit con ID cced03dd667a5df6df8fd40d8de0bff477ee02e8 contiene m\u00faltiples vulnerabilidades de acceso fuera de array en el protocolo mms que puede resultar en que los atacantes accedan a datos fuera de l\u00edmites. Este ataque parece ser explotable mediante conectividad de red. La vulnerabilidad parece haber sido solucionada en cced03dd667a5df6df8fd40d8de0bff477ee02e8 y siguientes."
}
],
"id": "CVE-2018-1999010",
"lastModified": "2024-11-21T03:57:02.590",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-23T15:29:00.297",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104896"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104896"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00006.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
SUSE-SU-2018:2305-1
Vulnerability from csaf_suse - Published: 2018-08-10 20:25 - Updated: 2018-08-10 20:25Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ffmpeg",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ffmpeg fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-13302: Fixed out of array access issue (bsc#1100356).\n- CVE-2018-1999010: Fixed multiple out of array access vulnerabilities in the\n mms protocol that could result in accessing out of bound data via specially\n crafted input files (bnc#1102899)\n- CVE-2018-1999011: Fixed a heap buffer overflow in asf_o format demuxer that\n could result in remote code execution (bnc#1102689)\n- CVE-2018-1999012: Fixed an infinite loop vulnerability in pva format demuxer\n that could result in excessive amount of ressource allocation like CPU an RAM\n (CVE-2018-1999012 bnc#1102688).\n- CVE-2018-1999013: Fixed an use-after-free vulnerability in the realmedia\n demuxer that could allow remote attackers to read heap memory (bnc#1102687)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Desktop-Applications-15-2018-1544,SUSE-SLE-Product-WE-15-2018-1544",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2305-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2305-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182305-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2305-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004405.html"
},
{
"category": "self",
"summary": "SUSE Bug 1100356",
"url": "https://bugzilla.suse.com/1100356"
},
{
"category": "self",
"summary": "SUSE Bug 1102687",
"url": "https://bugzilla.suse.com/1102687"
},
{
"category": "self",
"summary": "SUSE Bug 1102688",
"url": "https://bugzilla.suse.com/1102688"
},
{
"category": "self",
"summary": "SUSE Bug 1102689",
"url": "https://bugzilla.suse.com/1102689"
},
{
"category": "self",
"summary": "SUSE Bug 1102899",
"url": "https://bugzilla.suse.com/1102899"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13302 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1999010 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1999010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1999011 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1999011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1999012 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1999012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1999013 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1999013/"
}
],
"title": "Security update for ffmpeg",
"tracking": {
"current_release_date": "2018-08-10T20:25:31Z",
"generator": {
"date": "2018-08-10T20:25:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2305-1",
"initial_release_date": "2018-08-10T20:25:31Z",
"revision_history": [
{
"date": "2018-08-10T20:25:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libavcodec57-3.4.2-4.5.1.aarch64",
"product": {
"name": "libavcodec57-3.4.2-4.5.1.aarch64",
"product_id": "libavcodec57-3.4.2-4.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libavutil-devel-3.4.2-4.5.1.aarch64",
"product": {
"name": "libavutil-devel-3.4.2-4.5.1.aarch64",
"product_id": "libavutil-devel-3.4.2-4.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libavutil55-3.4.2-4.5.1.aarch64",
"product": {
"name": "libavutil55-3.4.2-4.5.1.aarch64",
"product_id": "libavutil55-3.4.2-4.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpostproc-devel-3.4.2-4.5.1.aarch64",
"product": {
"name": "libpostproc-devel-3.4.2-4.5.1.aarch64",
"product_id": "libpostproc-devel-3.4.2-4.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpostproc54-3.4.2-4.5.1.aarch64",
"product": {
"name": "libpostproc54-3.4.2-4.5.1.aarch64",
"product_id": "libpostproc54-3.4.2-4.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libswresample-devel-3.4.2-4.5.1.aarch64",
"product": {
"name": "libswresample-devel-3.4.2-4.5.1.aarch64",
"product_id": "libswresample-devel-3.4.2-4.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libswresample2-3.4.2-4.5.1.aarch64",
"product": {
"name": "libswresample2-3.4.2-4.5.1.aarch64",
"product_id": "libswresample2-3.4.2-4.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libswscale-devel-3.4.2-4.5.1.aarch64",
"product": {
"name": "libswscale-devel-3.4.2-4.5.1.aarch64",
"product_id": "libswscale-devel-3.4.2-4.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "libswscale4-3.4.2-4.5.1.aarch64",
"product": {
"name": "libswscale4-3.4.2-4.5.1.aarch64",
"product_id": "libswscale4-3.4.2-4.5.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libavcodec57-3.4.2-4.5.1.ppc64le",
"product": {
"name": "libavcodec57-3.4.2-4.5.1.ppc64le",
"product_id": "libavcodec57-3.4.2-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libavutil-devel-3.4.2-4.5.1.ppc64le",
"product": {
"name": "libavutil-devel-3.4.2-4.5.1.ppc64le",
"product_id": "libavutil-devel-3.4.2-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libavutil55-3.4.2-4.5.1.ppc64le",
"product": {
"name": "libavutil55-3.4.2-4.5.1.ppc64le",
"product_id": "libavutil55-3.4.2-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpostproc-devel-3.4.2-4.5.1.ppc64le",
"product": {
"name": "libpostproc-devel-3.4.2-4.5.1.ppc64le",
"product_id": "libpostproc-devel-3.4.2-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpostproc54-3.4.2-4.5.1.ppc64le",
"product": {
"name": "libpostproc54-3.4.2-4.5.1.ppc64le",
"product_id": "libpostproc54-3.4.2-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libswresample-devel-3.4.2-4.5.1.ppc64le",
"product": {
"name": "libswresample-devel-3.4.2-4.5.1.ppc64le",
"product_id": "libswresample-devel-3.4.2-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libswresample2-3.4.2-4.5.1.ppc64le",
"product": {
"name": "libswresample2-3.4.2-4.5.1.ppc64le",
"product_id": "libswresample2-3.4.2-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libswscale-devel-3.4.2-4.5.1.ppc64le",
"product": {
"name": "libswscale-devel-3.4.2-4.5.1.ppc64le",
"product_id": "libswscale-devel-3.4.2-4.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libswscale4-3.4.2-4.5.1.ppc64le",
"product": {
"name": "libswscale4-3.4.2-4.5.1.ppc64le",
"product_id": "libswscale4-3.4.2-4.5.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libavcodec57-3.4.2-4.5.1.s390x",
"product": {
"name": "libavcodec57-3.4.2-4.5.1.s390x",
"product_id": "libavcodec57-3.4.2-4.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libavutil-devel-3.4.2-4.5.1.s390x",
"product": {
"name": "libavutil-devel-3.4.2-4.5.1.s390x",
"product_id": "libavutil-devel-3.4.2-4.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libavutil55-3.4.2-4.5.1.s390x",
"product": {
"name": "libavutil55-3.4.2-4.5.1.s390x",
"product_id": "libavutil55-3.4.2-4.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libpostproc-devel-3.4.2-4.5.1.s390x",
"product": {
"name": "libpostproc-devel-3.4.2-4.5.1.s390x",
"product_id": "libpostproc-devel-3.4.2-4.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libpostproc54-3.4.2-4.5.1.s390x",
"product": {
"name": "libpostproc54-3.4.2-4.5.1.s390x",
"product_id": "libpostproc54-3.4.2-4.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libswresample-devel-3.4.2-4.5.1.s390x",
"product": {
"name": "libswresample-devel-3.4.2-4.5.1.s390x",
"product_id": "libswresample-devel-3.4.2-4.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libswresample2-3.4.2-4.5.1.s390x",
"product": {
"name": "libswresample2-3.4.2-4.5.1.s390x",
"product_id": "libswresample2-3.4.2-4.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libswscale-devel-3.4.2-4.5.1.s390x",
"product": {
"name": "libswscale-devel-3.4.2-4.5.1.s390x",
"product_id": "libswscale-devel-3.4.2-4.5.1.s390x"
}
},
{
"category": "product_version",
"name": "libswscale4-3.4.2-4.5.1.s390x",
"product": {
"name": "libswscale4-3.4.2-4.5.1.s390x",
"product_id": "libswscale4-3.4.2-4.5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libavcodec57-3.4.2-4.5.1.x86_64",
"product": {
"name": "libavcodec57-3.4.2-4.5.1.x86_64",
"product_id": "libavcodec57-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libavutil-devel-3.4.2-4.5.1.x86_64",
"product": {
"name": "libavutil-devel-3.4.2-4.5.1.x86_64",
"product_id": "libavutil-devel-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libavutil55-3.4.2-4.5.1.x86_64",
"product": {
"name": "libavutil55-3.4.2-4.5.1.x86_64",
"product_id": "libavutil55-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpostproc-devel-3.4.2-4.5.1.x86_64",
"product": {
"name": "libpostproc-devel-3.4.2-4.5.1.x86_64",
"product_id": "libpostproc-devel-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpostproc54-3.4.2-4.5.1.x86_64",
"product": {
"name": "libpostproc54-3.4.2-4.5.1.x86_64",
"product_id": "libpostproc54-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libswresample-devel-3.4.2-4.5.1.x86_64",
"product": {
"name": "libswresample-devel-3.4.2-4.5.1.x86_64",
"product_id": "libswresample-devel-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libswresample2-3.4.2-4.5.1.x86_64",
"product": {
"name": "libswresample2-3.4.2-4.5.1.x86_64",
"product_id": "libswresample2-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libswscale-devel-3.4.2-4.5.1.x86_64",
"product": {
"name": "libswscale-devel-3.4.2-4.5.1.x86_64",
"product_id": "libswscale-devel-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libswscale4-3.4.2-4.5.1.x86_64",
"product": {
"name": "libswscale4-3.4.2-4.5.1.x86_64",
"product_id": "libswscale4-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libavcodec-devel-3.4.2-4.5.1.x86_64",
"product": {
"name": "libavcodec-devel-3.4.2-4.5.1.x86_64",
"product_id": "libavcodec-devel-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libavformat-devel-3.4.2-4.5.1.x86_64",
"product": {
"name": "libavformat-devel-3.4.2-4.5.1.x86_64",
"product_id": "libavformat-devel-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libavformat57-3.4.2-4.5.1.x86_64",
"product": {
"name": "libavformat57-3.4.2-4.5.1.x86_64",
"product_id": "libavformat57-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libavresample-devel-3.4.2-4.5.1.x86_64",
"product": {
"name": "libavresample-devel-3.4.2-4.5.1.x86_64",
"product_id": "libavresample-devel-3.4.2-4.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "libavresample3-3.4.2-4.5.1.x86_64",
"product": {
"name": "libavresample3-3.4.2-4.5.1.x86_64",
"product_id": "libavresample3-3.4.2-4.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libavcodec57-3.4.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64"
},
"product_reference": "libavcodec57-3.4.2-4.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavcodec57-3.4.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le"
},
"product_reference": "libavcodec57-3.4.2-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavcodec57-3.4.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x"
},
"product_reference": "libavcodec57-3.4.2-4.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavcodec57-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64"
},
"product_reference": "libavcodec57-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavutil-devel-3.4.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64"
},
"product_reference": "libavutil-devel-3.4.2-4.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavutil-devel-3.4.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le"
},
"product_reference": "libavutil-devel-3.4.2-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavutil-devel-3.4.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x"
},
"product_reference": "libavutil-devel-3.4.2-4.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavutil-devel-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64"
},
"product_reference": "libavutil-devel-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavutil55-3.4.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64"
},
"product_reference": "libavutil55-3.4.2-4.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavutil55-3.4.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le"
},
"product_reference": "libavutil55-3.4.2-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavutil55-3.4.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x"
},
"product_reference": "libavutil55-3.4.2-4.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavutil55-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64"
},
"product_reference": "libavutil55-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpostproc-devel-3.4.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64"
},
"product_reference": "libpostproc-devel-3.4.2-4.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpostproc-devel-3.4.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le"
},
"product_reference": "libpostproc-devel-3.4.2-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpostproc-devel-3.4.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x"
},
"product_reference": "libpostproc-devel-3.4.2-4.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpostproc-devel-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64"
},
"product_reference": "libpostproc-devel-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpostproc54-3.4.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64"
},
"product_reference": "libpostproc54-3.4.2-4.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpostproc54-3.4.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le"
},
"product_reference": "libpostproc54-3.4.2-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpostproc54-3.4.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x"
},
"product_reference": "libpostproc54-3.4.2-4.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpostproc54-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64"
},
"product_reference": "libpostproc54-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswresample-devel-3.4.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64"
},
"product_reference": "libswresample-devel-3.4.2-4.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswresample-devel-3.4.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le"
},
"product_reference": "libswresample-devel-3.4.2-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswresample-devel-3.4.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x"
},
"product_reference": "libswresample-devel-3.4.2-4.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswresample-devel-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64"
},
"product_reference": "libswresample-devel-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswresample2-3.4.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64"
},
"product_reference": "libswresample2-3.4.2-4.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswresample2-3.4.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le"
},
"product_reference": "libswresample2-3.4.2-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswresample2-3.4.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x"
},
"product_reference": "libswresample2-3.4.2-4.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswresample2-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64"
},
"product_reference": "libswresample2-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswscale-devel-3.4.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64"
},
"product_reference": "libswscale-devel-3.4.2-4.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswscale-devel-3.4.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le"
},
"product_reference": "libswscale-devel-3.4.2-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswscale-devel-3.4.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x"
},
"product_reference": "libswscale-devel-3.4.2-4.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswscale-devel-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64"
},
"product_reference": "libswscale-devel-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswscale4-3.4.2-4.5.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64"
},
"product_reference": "libswscale4-3.4.2-4.5.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswscale4-3.4.2-4.5.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le"
},
"product_reference": "libswscale4-3.4.2-4.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswscale4-3.4.2-4.5.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x"
},
"product_reference": "libswscale4-3.4.2-4.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libswscale4-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64"
},
"product_reference": "libswscale4-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavcodec-devel-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64"
},
"product_reference": "libavcodec-devel-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavformat-devel-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64"
},
"product_reference": "libavformat-devel-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavformat57-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64"
},
"product_reference": "libavformat57-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavresample-devel-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64"
},
"product_reference": "libavresample-devel-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libavresample3-3.4.2-4.5.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
},
"product_reference": "libavresample3-3.4.2-4.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-13302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13302"
}
],
"notes": [
{
"category": "general",
"text": "In FFmpeg 4.0.1, improper handling of frame types (other than EAC3_FRAME_TYPE_INDEPENDENT) that have multiple independent substreams in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array access while converting a crafted AVI file to MPEG4, leading to a denial of service or possibly unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13302",
"url": "https://www.suse.com/security/cve/CVE-2018-13302"
},
{
"category": "external",
"summary": "SUSE Bug 1100356 for CVE-2018-13302",
"url": "https://bugzilla.suse.com/1100356"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-10T20:25:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-13302"
},
{
"cve": "CVE-2018-1999010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1999010"
}
],
"notes": [
{
"category": "general",
"text": "FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5df6df8fd40d8de0bff477ee02e8 and later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1999010",
"url": "https://www.suse.com/security/cve/CVE-2018-1999010"
},
{
"category": "external",
"summary": "SUSE Bug 1102899 for CVE-2018-1999010",
"url": "https://bugzilla.suse.com/1102899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-10T20:25:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-1999010"
},
{
"cve": "CVE-2018-1999011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1999011"
}
],
"notes": [
{
"category": "general",
"text": "FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1999011",
"url": "https://www.suse.com/security/cve/CVE-2018-1999011"
},
{
"category": "external",
"summary": "SUSE Bug 1102689 for CVE-2018-1999011",
"url": "https://bugzilla.suse.com/1102689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-10T20:25:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-1999011"
},
{
"cve": "CVE-2018-1999012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1999012"
}
],
"notes": [
{
"category": "general",
"text": "FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has to be provided as input. This vulnerability appears to have been fixed in 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 and later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1999012",
"url": "https://www.suse.com/security/cve/CVE-2018-1999012"
},
{
"category": "external",
"summary": "SUSE Bug 1102688 for CVE-2018-1999012",
"url": "https://bugzilla.suse.com/1102688"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-10T20:25:31Z",
"details": "low"
}
],
"title": "CVE-2018-1999012"
},
{
"cve": "CVE-2018-1999013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1999013"
}
],
"notes": [
{
"category": "general",
"text": "FFmpeg before commit a7e032a277452366771951e29fd0bf2bd5c029f0 contains a use-after-free vulnerability in the realmedia demuxer that can result in vulnerability allows attacker to read heap memory. This attack appear to be exploitable via specially crafted RM file has to be provided as input. This vulnerability appears to have been fixed in a7e032a277452366771951e29fd0bf2bd5c029f0 and later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1999013",
"url": "https://www.suse.com/security/cve/CVE-2018-1999013"
},
{
"category": "external",
"summary": "SUSE Bug 1102687 for CVE-2018-1999013",
"url": "https://bugzilla.suse.com/1102687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavcodec57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libavutil55-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libpostproc54-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswresample2-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15:libswscale4-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavcodec-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavformat57-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample-devel-3.4.2-4.5.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:libavresample3-3.4.2-4.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-10T20:25:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-1999013"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.