Debian alert DSA-6034-1 (tryton-sao)
| From: | Moritz Muehlenhoff <jmm@debian.org> | |
| To: | debian-security-announce@lists.debian.org | |
| Subject: | [SECURITY] [DSA 6034-1] tryton-sao security update | |
| Date: | Thu, 23 Oct 2025 18:18:08 +0000 | |
| Message-ID: | <aPpxYEQ6W-k38naq@seger.debian.org> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6034-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff October 23, 2025 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tryton-sao CVE ID : not yet available Brandon Da Costa and Mahdi Asfhar discovered a cross-site scripting vulnerability in the web client of the Tryton application platform. For the oldstable distribution (bookworm), this problem has been fixed in version 6.0.28+ds1-2+deb12u1. For the stable distribution (trixie), this problem has been fixed in version 7.0.28+ds1-1+deb13u1. We recommend that you upgrade your tryton-sao packages. For the detailed security status of tryton-sao please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tryton-sao Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmj6b4UACgkQEMKTtsN8 TjYbaA//V7VjHQtaBdEahtafmNmys9AnXLnFC4LiiVAQHte7GvWz2fGTyLlgPh3R 7aZKFF+/85hNlFYWm9eCjhu+GCSUevS/eOyQTlrSfxtEhtEpxwcw0CjI5qvJVwGh XSkJ4re+mBRMqN2YSBoXqz43SZNIWtKRJTc+c/dI4ezyhWB1o7cDn2jknM7EhVzF iNmjPpRAqoUOB/r9oM+rmm+ZvNx8FDrwM5spbdBdg4zQm9o2ONgtIshVGO+rl/SY Ca20iasdTgnh3AUF7Amw0hrfaqOW0BLibCMEhS9HfGiHAZuUxFxWr2PPra71SUTU kBVE5/52cg62BHFvwaMbmIDfFE8/g6VEqmATAwX9U4+lPgQzqeEqoaRa0avy8isQ lwpIfWYtEzFuYxqRAC+PjL173e2++BB/40l2glVKgo1xp7kVdK72KOP78Iribb2G 9fjNxZdAk8sgKZyQ6T6cxrRYvqAKUWcJrRpUVbrn9IndVVOfmsE0npDHRy1uSYoG TPQdl3K2mzs5mJxNn/bvkhdD71eCoUg3yUwQpKoariDTtr/SAfL+Sp9GkBTKpbiX AAmcX7x/ycZFFBVKmkGTy3mBzbqtx6FVB2KKrVMoepWGxkShR9SBOGs9j0j27dz9 hbY2R+m6WO7YRWSc/rGiWo3OtYgHxofDCmi/K7RiGsrTdjwxjpE= =CETo -----END PGP SIGNATURE-----
