-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5047-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff January 15, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : prosody
CVE ID : CVE-2022-0217
Matthew Wild discovered that the WebSockets code in Prosody, a
lightweight Jabber/XMPP server, was susceptible to denial of service.
For the oldstable distribution (buster), this problem has been fixed
in version 0.11.2-1+deb10u3.
For the stable distribution (bullseye), this problem has been fixed in
version 0.11.9-2+deb11u1.
We recommend that you upgrade your prosody packages.
For the detailed security status of prosody please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/prosody
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmHjE18ACgkQEMKTtsN8 Tjaafg//X/AVSHF1C8bQMPPAceX6Q1xABkPHe6Z0BRbKfR2m5oTRtVN1fl+ZUaiv 99R/rhYKOhf2YZ2PdqzQWss1S0EvfWsskhchMZiQKoHc9NJEkudUh3rFaK79zeMc 9OxZceKMBC7bq6vkMLwwgyhD4hkEWNRK7N2CWKa6PQ7Ndly8Id7aAy4QS/j7HQdu oNNWfJv+6nP7PNY9K77HkvwiEDxkegpTbT1VlBQsnMzjaiPvtu++IkKvzRhEPcbs PEdQoKeOwHMXvXAKVTPyvz34/10NtFdsEaRlggjFj0nPetlVY+QCT2BqNf54Xwi1 I/J/hwBi9CztUQvjK+kIIsUHxUbCaE6Zlu6ufmE7Uhlj+IOrSm6Id0FguxGLlxXs NxRnX8WyQjgvFX9qT9rI5JYPl0gm76TY0kv/RB98FR5vMpyvqChK2Z2AKEk04hSv 5QnL7QWEXjbmQamWamdFt5dw/5bSxhxz9f9AIqDnQJpBN9csoXtQ+onyTB+WiMQt fIDOL1K42j+uHKgzHnmfNRsRWMZrLm7r9g9gdozb5+IKsfe3hT+u8sxkkOub6zzX MAHqpgU8MoixY/88oDH3eeFU6Y3UovRsom1Z1+6UW0FovrVrGXPX5cmocJZjKjlB edXT2Q1Xylk4NAwWKBVJDPnt2sN8RC3UiNWzLfgH5mCc2wGCZy0=
=RRZW
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)