-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2895-2                   security@debian.org
http://www.debian.org/security/                             Luciano Bello
April 21, 2014                         http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : prosody
CVE ID         : CVE-2014-2744 CVE-2014-2745
Debian Bug     : 743836

The update for prosody in DSA 2895 caused a regression when a client 
logins with the compression functionality activated. This update corrects
that problem. For reference, the original advisory text follows.

A denial-of-service vulnerability has been reported in Prosody, a XMPP 
server. If compression is enabled, an attacker might send highly-com-
pressed XML elements (attack known as "zip bomb") over XMPP streams and 
consume all the resources of the server.

For the stable distribution (wheezy), this problem has been fixed in
version 0.8.2-4+deb7u2 of prosody.

We recommend that you upgrade your prosody package.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-2895-2: prosody regression update

April 21, 2014
The update for prosody in DSA 2895 caused a regression when a client logins with the compression functionality activated

Summary

The update for prosody in DSA 2895 caused a regression when a client
logins with the compression functionality activated. This update corrects
that problem. For reference, the original advisory text follows.

A denial-of-service vulnerability has been reported in Prosody, a XMPP
server. If compression is enabled, an attacker might send highly-com-
pressed XML elements (attack known as "zip bomb") over XMPP streams and
consume all the resources of the server.

For the stable distribution (wheezy), this problem has been fixed in
version 0.8.2-4+deb7u2 of prosody.

We recommend that you upgrade your prosody package.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Package : prosody
CVE ID : CVE-2014-2744 CVE-2014-2745
Debian Bug : 743836

Related News