it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5047-1] prosody security update
- Date: Sat, 15 Jan 2022 18:36:08 +0000
- List-archive: https://lists.debian.org/msgid-search/20220115183608.GA323 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=fM65cdpo6ujia92y01SHV73+bktdXUz8M7zu6o4BVtw=; b=Ep CBRMf0bRlt0wwuaxsaxi7Wk4zKJrUANMMXBO1a6W0CHIpKSJjIPybTKXYXsVK9YbX/XGWvphyhHSY QteKXstRQLXV6n/5u+KsvlJaFS45My1RcgxkJSpK9B0IMj/LPPUi/G54qsCUAIeidyuFz9HJ67w7n gZ/rDKYiBQGKguP1KQx+gOafUYxkKaN7uDqzDIW77FAHycUwOQVOpGvLtxWcvcLw066842xHppS/n 57kBEHE4ngN6Tj8mt7k5gl+6mE9qXa+gXSJtS++byrKwXRT7duQHkbChe71deNr92fpZdfFOxEBrX bb4iTFy+lkTCg20nV8ZW/rdBoCDa7qgQ==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Sat, 15 Jan 2022 18:36:29 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <wF0A2nYCcDL.A.HUE.tQx4hB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5047-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
January 15, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : prosody
CVE ID : CVE-2022-0217
Matthew Wild discovered that the WebSockets code in Prosody, a
lightweight Jabber/XMPP server, was susceptible to denial of service.
For the oldstable distribution (buster), this problem has been fixed
in version 0.11.2-1+deb10u3.
For the stable distribution (bullseye), this problem has been fixed in
version 0.11.9-2+deb11u1.
We recommend that you upgrade your prosody packages.
For the detailed security status of prosody please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/prosody
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=RRZW
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5047-1] prosody security update, Moritz Muehlenhoff, 15.01.2022
Archiv bereitgestellt durch MHonArc 2.6.24.