—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ————————————————————————-
Debian Security Advisory DSA-3850-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 12, 2017 https://www.debian.org/security/faq
– ————————————————————————-
Package : rtmpdump
CVE ID : CVE-2015-8270 CVE-2015-8271 CVE-2015-8272
Dave McDaniel discovered multiple vulnerabilities in rtmpdump, a small
dumper/library for RTMP media streams, which may result in denial of
service or the execution of arbitrary code if a malformed stream is
dumped.
For the stable distribution (jessie), these problems have been fixed in
version 2.4+20150115.gita107cef-1+deb8u1.
For the upcoming stable distribution (stretch), these problems have been
fixed in version 2.4+20151223.gitfa8646d.1-1.
For the unstable distribution (sid), these problems have been fixed in
version 2.4+20151223.gitfa8646d.1-1.
We recommend that you upgrade your rtmpdump packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–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=myd7
—–END PGP SIGNATURE—–