-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2945-1 [email protected] https://www.debian.org/lts/security/ Emilio Pozuelo Monfort March 11, 2022 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : tryton-server Version : 4.2.1-2+deb9u2 CVE ID : CVE-2022-26661 CVE-2022-26662 Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton application platform, which may result in information disclosure or denial of service. For Debian 9 stretch, these problems have been fixed in version 4.2.1-2+deb9u2. We recommend that you upgrade your tryton-server packages. For the detailed security status of tryton-server please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tryton-server Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAmIqjIIACgkQnUbEiOQ2 gwIPGA/9GzA1Mvj+N/M8avdDh3ZjMUVg8m0j8WceCBsevrEItd+tvMQhMn81RhIP /WTabSRjHvCI8QA6lK1p5pY3tm35MJ2r3FuhaiSNMDcR9Ppgk3x3x6t28RmPMZM9 uCP7aqkL1YtXuxhkKZSPYzYT/wphCi5PEcwF3DvEZtX5KIFSNeiO0R2BxKr5kaFU nS4chSVwI28qrPiKBeJAkJZcOuRQvZuQgOvrVKy5xA9B2/ukSFz3pGluJ0R5j92u BEPcZ1MJLhjhEeFqg0Ys1hzSEO8th41BmxYsbJzqshJH9x6xuvqml7+eL1rmyQLX D1jlC8xuRx5JSIBYMhDY6nOXx6sreVjh/h08BwAsD0Ivf5TnZdjOIE1okOhQE2T/ jjBzkQA7N5ICnB/g0b8VXsLolWH3ZMgKNPPRtpo14qBujQtLqZ33SIe3Xe9stQnW dVKU8tgrwl+90IikEdNx6ESQF6rEXE4cSso/a9fVRYXkFTu/o/AOMBNT7AfWS5IT jkZO54U2KIoxRF9mD2DzEBNhN9B/yNMvjNWz03DtHfb9FZzcd3M2kZ0g80xhsGeE zI6/qRyVhoZGd61Bal04n82TvltHa+3G4K+IQIARHmV+M0meGNVcG+YtZoD3k3lc qfWxm3JABiqgpPF8YALrsipQ21H5LZHO/bGTci4PmQWUF/j7SUI= =zkgc -----END PGP SIGNATURE-----
