[SECURITY] [DLA 1439-1] resiprocate security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : resiprocate
Version : 1:1.9.7-5+deb8u1
CVE ID : CVE-2017-11521 CVE-2018-12584
CVE-2018-12584
A flaw in function ConnectionBase::preparseNewBytes of
resip/stack/ConnectionBase.cxx has been detected, that
allows remote attackers to cause a denial of service
(buffer overflow) or possibly execute arbitrary code
when TLS communication is enabled.
CVE-2017-11521
A flaw in function SdpContents::Session::Medium::parse of
resip/stack/SdpContents.cxx has been detected, that allows
remote attackers to cause a denial of service (memory
consumption) by triggering many media connections.
For Debian 8 "Jessie", these problems have been fixed in version
1:1.9.7-5+deb8u1.
We recommend that you upgrade your resiprocate packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=YNnK
-----END PGP SIGNATURE-----
Reply to: