[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 391-1] prosody security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : prosody
Version        : 0.7.0-1squeeze1+deb6u1
CVE ID         : CVE-2016-1232

It was discovered that in prosody, a Lightweight Jabber/XMPP server,
used a weak PRNG in the mod_dialback module.

For Debian 6 Squeeze, this issue has been fixed in prosody version
0.7.0-1squeeze1+deb6u1.


Regards,

- -- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=OgdD
-----END PGP SIGNATURE-----


Reply to: