-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5047-2
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff January 29, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : prosody
Debian Bug : 1004173
The update for prosody released as DSA 5047 introduced a memory leak.
Updated prosody packages are now available to correct this issue.
For the oldstable distribution (buster), this problem has been fixed
in version 0.11.2-1+deb10u4.
For the stable distribution (bullseye), this problem has been fixed in
version 0.11.9-2+deb11u2.
We recommend that you upgrade your prosody packages.
For the detailed security status of prosody please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/prosody
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmH1wMkACgkQEMKTtsN8 TjbfZQ//VAel5+s6iY3BanVwFAJP3/8X8fVDxiSabtJ6V3tEBBy8TjNgb43N1rDa X8R6kDB5RYmU5HbVmRDeFD1bHsF//B5K6FqnYsuBZHJyLWdYmjviUeWmI+KxlvZD Ex5cxeJa6MWyOTIspheNuoAFt9neKac/CCWOzWVbtWeip0JVh3oaAbVFTePpcGy7 Fn8BySaB3wsZO/gQQHkii5ridxQZoWhIUfoEtPJrV29m0Lkyqm/ZNB5IcjZL2wrJ mC5y9hk+0gNVkfKqLj7vQsSfladb9KpbJC9BLERCtrg4wst9fwUw/gaLOclAV9Ug ktdCgY4RU3596Tk9g2pv1I1iZidQ9KzSsYRUWwgkI3ksokKcyB8FmSNGodDpz1CI rFDUjyJouRmfD7BqAbNzFO+mnL6tG2hDKNqBDZxv/2/n2+QwrWZhK5wjAPUVtJux B3QTI7JRUFF7iyWo0mLHZ1wf5EAwz/7iPenASqubGBg9QTHKR+Cf8Wk1AXdMXfQk eIIQgc/GqmNZkb3KI4s7K32YJC0bT3A7DABwE7/AsbS1reB5oqnbfJ3YLBH9Ahsh 154JNz7Y58JiH6DoQbWjlKmp0RkxSrW5hms/RBOEJDkBy1Z2yo6eVkW3BWoWL5Jg bIn4oj2yHZyYSjdqNP1npCwrXNrDGyiMwZq6qzzINa3qTQb1GZs=
=gTBD
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)