-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5047-2 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff January 29, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : prosody Debian Bug : 1004173 The update for prosody released as DSA 5047 introduced a memory leak. Updated prosody packages are now available to correct this issue. For the oldstable distribution (buster), this problem has been fixed in version 0.11.2-1+deb10u4. For the stable distribution (bullseye), this problem has been fixed in version 0.11.9-2+deb11u2. We recommend that you upgrade your prosody packages. For the detailed security status of prosody please refer to its security tracker page at: https://security-tracker.debian.org/tracker/prosody Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmH1wMkACgkQEMKTtsN8 TjbfZQ//VAel5+s6iY3BanVwFAJP3/8X8fVDxiSabtJ6V3tEBBy8TjNgb43N1rDa X8R6kDB5RYmU5HbVmRDeFD1bHsF//B5K6FqnYsuBZHJyLWdYmjviUeWmI+KxlvZD Ex5cxeJa6MWyOTIspheNuoAFt9neKac/CCWOzWVbtWeip0JVh3oaAbVFTePpcGy7 Fn8BySaB3wsZO/gQQHkii5ridxQZoWhIUfoEtPJrV29m0Lkyqm/ZNB5IcjZL2wrJ mC5y9hk+0gNVkfKqLj7vQsSfladb9KpbJC9BLERCtrg4wst9fwUw/gaLOclAV9Ug ktdCgY4RU3596Tk9g2pv1I1iZidQ9KzSsYRUWwgkI3ksokKcyB8FmSNGodDpz1CI rFDUjyJouRmfD7BqAbNzFO+mnL6tG2hDKNqBDZxv/2/n2+QwrWZhK5wjAPUVtJux B3QTI7JRUFF7iyWo0mLHZ1wf5EAwz/7iPenASqubGBg9QTHKR+Cf8Wk1AXdMXfQk eIIQgc/GqmNZkb3KI4s7K32YJC0bT3A7DABwE7/AsbS1reB5oqnbfJ3YLBH9Ahsh 154JNz7Y58JiH6DoQbWjlKmp0RkxSrW5hms/RBOEJDkBy1Z2yo6eVkW3BWoWL5Jg bIn4oj2yHZyYSjdqNP1npCwrXNrDGyiMwZq6qzzINa3qTQb1GZs= =gTBD -----END PGP SIGNATURE-----