Mehrere Probleme in libosip2
ID: | DSA-3879-1 |
Distribution: | Debian |
Plattformen: | Debian sid, Debian jessie |
Datum: | Di, 13. Juni 2017, 23:09 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7853
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10325 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10326 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10324 |
Applikationen: | libosip2 |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3879-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff June 13, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libosip2 CVE ID : CVE-2016-10324 CVE-2016-10325 CVE-2016-10326 CVE-2017-7853 Multiple security vulnerabilities have been found in oSIP, a library implementing the Session Initiation Protocol, which might result in denial of service through malformed SIP messages. For the stable distribution (jessie), these problems have been fixed in version 4.1.0-2+deb8u1. For the upcoming stable distribution (stretch), these problems have been fixed in version 4.1.0-2.1. For the unstable distribution (sid), these problems have been fixed in version 4.1.0-2.1. We recommend that you upgrade your libosip2 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAllATZwACgkQEMKTtsN8 TjaLYQ//YVeSlMZICaqC0fDCtkfh2w3hwjjy1CmpAZ3MwcrS6EqRA8qTTcme5Z3Y wcLZlC+LtdRborm8ZRsvqABhJYFw6kWBeTxtuhUeeF4zE0A1fIwxLi3XuPxaRxHH NM9WDz9JkiAWf2OECbCvL3eGx5BSKdTl7WMrgAnTnppRjWyfZrSxqfr6zSaF+MgK 68ctFsGtJ17nb89YWXLVQzt9FIzOSYa6Un+5nm0whHvlGOqxXzKX9cv/tXbEL66C +WKhZHbjAUF5m9VywGgr5/UGcw50VHEF9aR0bmeV7ramez+kedsWlc0ypEcKjSFs +maAb+XLoiqmgGARuU1BOZT8H1LYg0cpY9NNXiOd9VnOijVQ9IcKj5n6sLZzC+Cp XwGOVJjpjnNe5NyQAGhk9Ta1Ky72Iddw/S2/zIJOEtl5FuHTCbet/NIu2EoNEQ4Q 0WJjPx099m7PsrUNADddIhQnnQti0uGD3cXzibKrSrTvfrb+ec8FgYtkqGbe64l/ TJZA1tYVuUwWMUn/dsJbnl0E8h1N/n739nd3SdGxmCa8+1rhOAUHsK84H9dfJT0P HoPPmbkohXuuI28ZWcl9JavuKBqpsKSzJ9A6cupL57r7CvoAJQhTzXiSSCnisotY BuQnBFaYzYBdLsNOOHHuEZdAoDpSrVSvFBOuKjdh6matYzbFpco= =hrHH -----END PGP SIGNATURE----- |