lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20200131215517.ttzcpgwqq3acb5ts@seger.debian.org> Date: Fri, 31 Jan 2020 21:55:17 +0000 From: Moritz Muehlenhoff <jmm@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 4612-1] prosody-modules security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4612-1 security@...ian.org https://www.debian.org/security/ Moritz Muehlenhoff January 31, 2020 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : prosody-modules CVE ID : CVE-2020-8086 It was discovered that the LDAP authentication modules for the Prosody Jabber/XMPP server incorrectly validated the XMPP address when checking whether a user has admin access. For the oldstable distribution (stretch), this problem has been fixed in version 0.0~hg20170123.3ed504b944e5+dfsg-1+deb9u1. For the stable distribution (buster), this problem has been fixed in version 0.0~hg20190203.b54e98d5c4a1+dfsg-1+deb10u1. We recommend that you upgrade your prosody-modules packages. For the detailed security status of prosody-modules please refer to its security tracker page at: https://security-tracker.debian.org/tracker/prosody-modules Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl40oagACgkQEMKTtsN8 TjYagA/9FlyTEApy/3/nMy5VfivlmmQyoJbYeRmIpYho6rvZXjoeFJ6EEGZZnLDz xrmrxdFHkbkkaFE0e3RyuZsx1jY1YpN4kLGUXm8j+gORe40sLjzMp12Jt5/DaE1U kzmUkfrQud9PEGTeSeQ/4W6WQ4mEymd8kO/S1ZEcMeE+xWnL6C2HBrgtJNAjPhyY 6w07uPhDXOO3xxQxxiZkEdfSvzZi2kRMD5YkabRJLCGZM1fg8F2vxWIB40hPbLz4 SamjvuazFOWke4H3ngs1GiRIr9Wsacxo54piyEdf1VQ+bI/lHpX+IObTFgnD3dmB 6qWmef/zpBKQW7VLaii70PiJWhYGgVJZEQOxJKSwNwMI1Ofdu/3IYevFHlCQMxs2 L9gH/y8VeJL7sPGHgFDXOYzHoUQrbdEYG1S2mjtpv6B7AIPQw8N+ylkTMgIFeabV sMB7ZLofHtl0YkNTNJaAdtMXpJXB6qLGc3B1VFMOD0V1KdvQl1AHnjyCMG6o11YG S95F2j3P8KQJhT7nUtB/kT5Rw6mGn0YH/3qUy6XLkw/F81f6WIV1gVIoIG0+CPET bCeFaj3u1gYgaLHbCGteIwtqbhPs5IUgKJh+BbXApRoNMIluQwyiMIxtjAQdvt4s nCZy626eDTDBlA2wKeYQVhBkUoSclAmAN3K/79rLHv/kTfuBLC4= =IOt/ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists