—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3879-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
June 13, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : libosip2
CVE ID : CVE-2016-10324 CVE-2016-10325 CVE-2016-10326 CVE-2017-7853
Multiple security vulnerabilities have been found in oSIP, a library
implementing the Session Initiation Protocol, which might result in
denial of service through malformed SIP messages.
For the stable distribution (jessie), these problems have been fixed in
version 4.1.0-2+deb8u1.
For the upcoming stable distribution (stretch), these problems have been
fixed in version 4.1.0-2.1.
For the unstable distribution (sid), these problems have been fixed in
version 4.1.0-2.1.
We recommend that you upgrade your libosip2 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAllATZwACgkQEMKTtsN8
TjaLYQ//YVeSlMZICaqC0fDCtkfh2w3hwjjy1CmpAZ3MwcrS6EqRA8qTTcme5Z3Y
wcLZlC+LtdRborm8ZRsvqABhJYFw6kWBeTxtuhUeeF4zE0A1fIwxLi3XuPxaRxHH
NM9WDz9JkiAWf2OECbCvL3eGx5BSKdTl7WMrgAnTnppRjWyfZrSxqfr6zSaF+MgK
68ctFsGtJ17nb89YWXLVQzt9FIzOSYa6Un+5nm0whHvlGOqxXzKX9cv/tXbEL66C
+WKhZHbjAUF5m9VywGgr5/UGcw50VHEF9aR0bmeV7ramez+kedsWlc0ypEcKjSFs
+maAb+XLoiqmgGARuU1BOZT8H1LYg0cpY9NNXiOd9VnOijVQ9IcKj5n6sLZzC+Cp
XwGOVJjpjnNe5NyQAGhk9Ta1Ky72Iddw/S2/zIJOEtl5FuHTCbet/NIu2EoNEQ4Q
0WJjPx099m7PsrUNADddIhQnnQti0uGD3cXzibKrSrTvfrb+ec8FgYtkqGbe64l/
TJZA1tYVuUwWMUn/dsJbnl0E8h1N/n739nd3SdGxmCa8+1rhOAUHsK84H9dfJT0P
HoPPmbkohXuuI28ZWcl9JavuKBqpsKSzJ9A6cupL57r7CvoAJQhTzXiSSCnisotY
BuQnBFaYzYBdLsNOOHHuEZdAoDpSrVSvFBOuKjdh6matYzbFpco=
=hrHH
—–END PGP SIGNATURE—–