This bug was fixed in the package prosody - 0.9.8-1ubuntu0.1

---------------
prosody (0.9.8-1ubuntu0.1) wily-security; urgency=medium

  * SECURITY UPDATE: path traversal vulnerability in mod_http_files
    - debian/patches/0008-CVE-2016-1231.patch
    - CVE-2016-1231
    - LP: #1532943
  * SECURITY UPDATE: use of weak PRNG in generation of dialback secrets
    - debian/patches/0009-CVE-2016-1232.patch
    - CVE-2016-1232
    - LP: #1532943

 -- Felix Geyer <de...@ubuntu.com>  Mon, 11 Jan 2016 20:55:43 +0100

** Changed in: prosody (Ubuntu)
       Status: In Progress => Fix Released

** Changed in: prosody (Ubuntu)
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1532943

Title:
  CVE-2016-1231 and CVE-2016-1232

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to