<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ffmpeg</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1532-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-06-11T09:31:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-06-11T09:31:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-06-11T09:31:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ffmpeg</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">ffmpeg was updated to fix the following security issues:
  
CVE-2016-10191: remote exploitaion results code execution ((bsc#1022921)
CVE-2016-10192: remote exploitaion results code execution bsc#1022922) 
CVE-2017-7866: stack-based buffer overflow (bsc#1034176) 
CVE-2017-7865: heap-based buffer overflow (bsc#1034177) 
CVE-2017-7863: heap-based buffer overflow (bsc#1034179)
CVE-2016-9561: Huge amount memory allocated, resulting in DoS (bsc#1015120)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2017-672</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015120</URL>
      <Description>SUSE Bug 1015120</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1022921</URL>
      <Description>SUSE Bug 1022921</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1022922</URL>
      <Description>SUSE Bug 1022922</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1034176</URL>
      <Description>SUSE Bug 1034176</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1034177</URL>
      <Description>SUSE Bug 1034177</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1034179</URL>
      <Description>SUSE Bug 1034179</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/980542</URL>
      <Description>SUSE Bug 980542</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10191/</URL>
      <Description>SUSE CVE CVE-2016-10191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-10192/</URL>
      <Description>SUSE CVE CVE-2016-10192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9561/</URL>
      <Description>SUSE CVE CVE-2016-9561 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7863/</URL>
      <Description>SUSE CVE CVE-2017-7863 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7865/</URL>
      <Description>SUSE CVE CVE-2017-7865 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7866/</URL>
      <Description>SUSE CVE CVE-2017-7866 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12 SP1">
      <Branch Type="Product Name" Name="SUSE Package Hub 12 SP1">
        <FullProductName ProductID="SUSE Package Hub 12 SP1" CPE="cpe:/o:suse:packagehub:12:sp1">SUSE Package Hub 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ffmpeg2-devel-2.8.11-12.1">
      <FullProductName ProductID="ffmpeg2-devel-2.8.11-12.1">ffmpeg2-devel-2.8.11-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavcodec56-2.8.11-12.1">
      <FullProductName ProductID="libavcodec56-2.8.11-12.1">libavcodec56-2.8.11-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavdevice56-2.8.11-12.1">
      <FullProductName ProductID="libavdevice56-2.8.11-12.1">libavdevice56-2.8.11-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavfilter5-2.8.11-12.1">
      <FullProductName ProductID="libavfilter5-2.8.11-12.1">libavfilter5-2.8.11-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavformat56-2.8.11-12.1">
      <FullProductName ProductID="libavformat56-2.8.11-12.1">libavformat56-2.8.11-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavresample2-2.8.11-12.1">
      <FullProductName ProductID="libavresample2-2.8.11-12.1">libavresample2-2.8.11-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libavutil54-2.8.11-12.1">
      <FullProductName ProductID="libavutil54-2.8.11-12.1">libavutil54-2.8.11-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpostproc53-2.8.11-12.1">
      <FullProductName ProductID="libpostproc53-2.8.11-12.1">libpostproc53-2.8.11-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libswresample1-2.8.11-12.1">
      <FullProductName ProductID="libswresample1-2.8.11-12.1">libswresample1-2.8.11-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libswscale3-2.8.11-12.1">
      <FullProductName ProductID="libswscale3-2.8.11-12.1">libswscale3-2.8.11-12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ffmpeg2-devel-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:ffmpeg2-devel-2.8.11-12.1">ffmpeg2-devel-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavcodec56-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:libavcodec56-2.8.11-12.1">libavcodec56-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavdevice56-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:libavdevice56-2.8.11-12.1">libavdevice56-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavfilter5-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:libavfilter5-2.8.11-12.1">libavfilter5-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavformat56-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:libavformat56-2.8.11-12.1">libavformat56-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavresample2-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:libavresample2-2.8.11-12.1">libavresample2-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libavutil54-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:libavutil54-2.8.11-12.1">libavutil54-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpostproc53-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:libpostproc53-2.8.11-12.1">libpostproc53-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libswresample1-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:libswresample1-2.8.11-12.1">libswresample1-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libswscale3-2.8.11-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12 SP1">
      <FullProductName ProductID="SUSE Package Hub 12 SP1:libswscale3-2.8.11-12.1">libswscale3-2.8.11-12.1 as a component of SUSE Package Hub 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check for RTMP packet size mismatches.</Note>
    </Notes>
    <CVE>CVE-2016-10191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP1:ffmpeg2-devel-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavcodec56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavdevice56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavfilter5-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavformat56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavresample2-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavutil54-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libpostproc53-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswresample1-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswscale3-2.8.11-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10191.html</URL>
        <Description>CVE-2016-10191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022921</URL>
        <Description>SUSE Bug 1022921</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.</Note>
    </Notes>
    <CVE>CVE-2016-10192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP1:ffmpeg2-devel-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavcodec56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavdevice56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavfilter5-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavformat56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavresample2-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavutil54-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libpostproc53-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswresample1-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswscale3-2.8.11-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-10192.html</URL>
        <Description>CVE-2016-10192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1022922</URL>
        <Description>SUSE Bug 1022922</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The che_configure function in libavcodec/aacdec_template.c in FFmpeg before 3.2.1 allows remote attackers to cause a denial of service (allocation of huge memory, and being killed by the OS) via a crafted MOV file.</Note>
    </Notes>
    <CVE>CVE-2016-9561</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP1:ffmpeg2-devel-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavcodec56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavdevice56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavfilter5-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavformat56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavresample2-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavutil54-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libpostproc53-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswresample1-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswscale3-2.8.11-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9561.html</URL>
        <Description>CVE-2016-9561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015120</URL>
        <Description>SUSE Bug 1015120</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FFmpeg before 2017-02-04 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame_common function in libavcodec/pngdec.c.</Note>
    </Notes>
    <CVE>CVE-2017-7863</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP1:ffmpeg2-devel-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavcodec56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavdevice56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavfilter5-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavformat56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavresample2-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavutil54-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libpostproc53-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswresample1-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswscale3-2.8.11-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7863.html</URL>
        <Description>CVE-2017-7863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034179</URL>
        <Description>SUSE Bug 1034179</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FFmpeg before 2017-01-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c.</Note>
    </Notes>
    <CVE>CVE-2017-7865</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP1:ffmpeg2-devel-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavcodec56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavdevice56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavfilter5-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavformat56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavresample2-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavutil54-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libpostproc53-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswresample1-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswscale3-2.8.11-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7865.html</URL>
        <Description>CVE-2017-7865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034177</URL>
        <Description>SUSE Bug 1034177</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FFmpeg before 2017-01-23 has an out-of-bounds write caused by a stack-based buffer overflow related to the decode_zbuf function in libavcodec/pngdec.c.</Note>
    </Notes>
    <CVE>CVE-2017-7866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12 SP1:ffmpeg2-devel-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavcodec56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavdevice56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavfilter5-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavformat56-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavresample2-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libavutil54-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libpostproc53-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswresample1-2.8.11-12.1</ProductID>
        <ProductID>SUSE Package Hub 12 SP1:libswscale3-2.8.11-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7866.html</URL>
        <Description>CVE-2017-7866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034176</URL>
        <Description>SUSE Bug 1034176</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
