lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 02 Jun 2018 18:56:21 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 4216-1] prosody security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4216-1                   security@...ian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
June 02, 2018                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : prosody
CVE ID         : CVE-2018-10847
Debian Bug     : 900524

It was discovered that Prosody, a lightweight Jabber/XMPP server, does
not properly validate client-provided parameters during XMPP stream
restarts, allowing authenticated users to override the realm associated
with their session, potentially bypassing security policies and allowing
impersonation.

Details can be found in the upstream advisory at
https://prosody.im/security/advisory_20180531/

For the oldstable distribution (jessie), this problem has been fixed
in version 0.9.7-2+deb8u4.

For the stable distribution (stretch), this problem has been fixed in
version 0.9.12-2+deb9u2.

We recommend that you upgrade your prosody packages.

For the detailed security status of prosody please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/prosody

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
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=aITq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ