Debian 10694 Published by

A security update for FFmpeg has been issued for Debian GNU/Linux 11 (Bullseye) LTS, along with a Redis update for Debian GNU/Linux 9 (Stretch) and 10 (Buster) Extended LTS.

[DLA 4241-1] ffmpeg security update
ELA-1481-1 redis security update




[SECURITY] [DLA 4241-1] ffmpeg security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4241-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Adrian Bunk
July 14, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : ffmpeg
Version : 7:4.3.9-0+deb11u1
CVE ID : CVE-2023-6601 CVE-2023-6602 CVE-2023-6604 CVE-2023-6605

Multiple vulnerabilities have been fixed in the multimedia framework FFmpeg.

CVE-2023-6601

Triggering arbitrary demuxers via base64 data URIs

CVE-2023-6602

Improper parsing of input files in HLS playlists

CVE-2023-6604

Demuxing of arbitrary data as XBIN-formatted data

CVE-2023-6605

Arbitrary HTTP GET requests via crafted DASH playlist

For Debian 11 bullseye, these problems have been fixed in version
7:4.3.9-0+deb11u1.

We recommend that you upgrade your ffmpeg packages.

For the detailed security status of ffmpeg please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ffmpeg

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



ELA-1481-1 redis security update


Package : redis
Version : 3:3.2.6-3+deb9u16 (stretch), 5:5.0.14-1+deb10u9 (buster)

Related CVEs :
CVE-2025-32023
CVE-2025-48367

Two issues were discovered in Redis, the key-value database:

CVE-2025-32023: An authenticated user may have used a
specially-crafted string to trigger a stack/heap out-of-bounds write during
hyperloglog operations, potentially leading to a remote code execution
vulnerability. Installations that used Redis’ ACL system to restrict
hyperloglog HLL commands are unaffected by this issue.

CVE-2025-48367: An unauthenticated connection could have caused
repeated IP protocol errors, leading to client starvation and ultimately
become a Denial of Service (DoS) attack.


ELA-1481-1 redis security update