[SECURITY] [DLA 2945-1] tryton-server security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2945-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
March 11, 2022 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : tryton-server
Version : 4.2.1-2+deb9u2
CVE ID : CVE-2022-26661 CVE-2022-26662
Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton
application platform, which may result in information disclosure or
denial of service.
For Debian 9 stretch, these problems have been fixed in version
4.2.1-2+deb9u2.
We recommend that you upgrade your tryton-server packages.
For the detailed security status of tryton-server please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tryton-server
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=zkgc
-----END PGP SIGNATURE-----
Reply to: