Prosody team is having a ball with CVEs recently, so they've released another update on their stable branch, 0.9.10, which fixes CVE-2016-0756. They strongly encourage users to upgrade: http://blog.prosody.im/prosody-0-9-10-released/
A commit references this bug: Author: lx Date: Thu Jan 28 21:00:56 UTC 2016 New revision: 407422 URL: https://svnweb.freebsd.org/changeset/ports/407422 Log: vuxml for prosody CVE-2016-0756. PR: 206707 Submitted by: Anton Shestakov Changes: head/security/vuxml/vuln.xml
A commit references this bug: Author: lx Date: Thu Jan 28 21:03:35 UTC 2016 New revision: 407423 URL: https://svnweb.freebsd.org/changeset/ports/407423 Log: Update to 0.9.10, fixing a user impersonation attack. PR: 206707 Submitted by: Anton Shestakov MFH: 2016Q1 Changes: head/net-im/prosody/Makefile head/net-im/prosody/distinfo
A commit references this bug: Author: junovitch Date: Sun Feb 14 00:04:51 UTC 2016 New revision: 408837 URL: https://svnweb.freebsd.org/changeset/ports/408837 Log: MFH: r407423 Update to 0.9.10, fixing a user impersonation attack. PR: 206707 Submitted by: Anton Shestakov <av6@dwimlabs.net> Approved by: ports-secteam (feld) Changes: _U branches/2016Q1/ branches/2016Q1/net-im/prosody/Makefile branches/2016Q1/net-im/prosody/distinfo
MFH, set merge-quarterly+ to reflect MFH, tag 'security', and close PR.