You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa prosody

Sigurnosni nedostaci programskog paketa prosody

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-e289f41b76
2016-01-21 04:13:52.521214
——————————————————————————–

Name : prosody
Product : Fedora 22
Version : 0.9.9
Release : 2.fc22
URL : https://prosody.im/
Summary : Flexible communications server for Jabber/XMPP
Description :
Prosody is a flexible communications server for Jabber/XMPP written in Lua.
It aims to be easy to use, and light on resources. For developers it aims
to be easy to extend and give a flexible system on which to rapidly develop
added functionality, or prototype new protocols.

——————————————————————————–
Update Information:

Prosody 0.9.9 ============= A summary of changes: Security fixes
————– * Fix path traversal vulnerability in mod_http_files
(CVE-2016-1231) * Fix use of weak PRNG in generation of dialback secrets
(CVE-2016-1232) Bugs —- * Improve handling of CNAME records in DNS * Fix
traceback when deleting a user in some configurations (issue #496) * MUC:
restrict_room_creation could prevent users from joining rooms (issue #458) *
MUC: fix occasional dropping of iq stanzas sent privately between occupants *
Fix a potential memory leak in mod_pep Additions ——— * Add http:list()
command to telnet to view active HTTP services * Simplify IPv4/v6 address
selection code for outgoing s2s * Add support for importing SCRAM hashes from
ejabberd
——————————————————————————–
References:

[ 1 ] Bug #1296984 – CVE-2016-1232 prosody: use of weak PRNG in generation of dialback secrets
https://bugzilla.redhat.com/show_bug.cgi?id=1296984
[ 2 ] Bug #1296983 – CVE-2016-1231 prosody: path traversal vulnerability in mod_http_files
https://bugzilla.redhat.com/show_bug.cgi?id=1296983
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update prosody’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2016-38e48069f8
2016-01-20 18:01:46.169403
——————————————————————————–

Name : prosody
Product : Fedora 23
Version : 0.9.9
Release : 2.fc23
URL : https://prosody.im/
Summary : Flexible communications server for Jabber/XMPP
Description :
Prosody is a flexible communications server for Jabber/XMPP written in Lua.
It aims to be easy to use, and light on resources. For developers it aims
to be easy to extend and give a flexible system on which to rapidly develop
added functionality, or prototype new protocols.

——————————————————————————–
Update Information:

Prosody 0.9.9 ============= A summary of changes: Security fixes
————– * Fix path traversal vulnerability in mod_http_files
(CVE-2016-1231) * Fix use of weak PRNG in generation of dialback secrets
(CVE-2016-1232) Bugs —- * Improve handling of CNAME records in DNS * Fix
traceback when deleting a user in some configurations (issue #496) * MUC:
restrict_room_creation could prevent users from joining rooms (issue #458) *
MUC: fix occasional dropping of iq stanzas sent privately between occupants *
Fix a potential memory leak in mod_pep Additions ——— * Add http:list()
command to telnet to view active HTTP services * Simplify IPv4/v6 address
selection code for outgoing s2s * Add support for importing SCRAM hashes from
ejabberd
——————————————————————————–
References:

[ 1 ] Bug #1296984 – CVE-2016-1232 prosody: use of weak PRNG in generation of dialback secrets
https://bugzilla.redhat.com/show_bug.cgi?id=1296984
[ 2 ] Bug #1296983 – CVE-2016-1231 prosody: path traversal vulnerability in mod_http_files
https://bugzilla.redhat.com/show_bug.cgi?id=1296983
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update prosody’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2016-01-0029-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci operacijskog sustava OS X El Capitan

Otkriveni su sigurnosni nedostaci u radu operacijskog sustava OS X El Capitan. Otkriveni nedostaci potencijalnim napadačima omogućuju pokretanje proizvoljnog programskog...

Close