[SECURITY] [DLA 2742-2] ffmpeg regression update

2021-08-22 Thread Anton Gladky
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian LTS Advisory DLA-2742-2debian-...@lists.debian.org
https://www.debian.org/lts/security/ Anton Gladky
August 22, 2021   https://wiki.debian.org/LTS
- -

Package: ffmpeg
Version: 7:3.2.15-0+deb9u4

During the backporting of one of patches in CVE-2020-22021 one line was wrongly
interpreted and it caused the regression during the deinterlacing process.
Thanks to Jari Ruusu for the reporting the issue and for the testing of
prepared update.

For Debian 9 stretch, this problem has been fixed in version
7:3.2.15-0+deb9u4.

We recommend that you upgrade your ffmpeg packages.

For the detailed security status of ffmpeg please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ffmpeg

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-BEGIN PGP SIGNATURE-
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=37ez
-END PGP SIGNATURE-



[SECURITY] [DLA 2747-1] ircii security update

2021-08-22 Thread Thorsten Alteholz

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian LTS Advisory DLA-2747-1debian-...@lists.debian.org
https://www.debian.org/lts/security/Thorsten Alteholz
August 22, 2021   https://wiki.debian.org/LTS
- -

Package: ircii
Version: 20151120-1+deb9u1
CVE ID : CVE-2021-29376


An issue has been found in ircii, an Internet Relay Chat client.
A crafted CTCP UTC message could allow an attacker to disconnect the
victim from an IRC server due to a segmentation fault and client crash.


For Debian 9 stretch, this problem has been fixed in version
20151120-1+deb9u1.

We recommend that you upgrade your ircii packages.

For the detailed security status of ircii please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ircii

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-BEGIN PGP SIGNATURE-
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=ItUX
-END PGP SIGNATURE-