-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6034-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff October 23, 2025 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : tryton-sao CVE ID : not yet available Brandon Da Costa and Mahdi Asfhar discovered a cross-site scripting vulnerability in the web client of the Tryton application platform. For the oldstable distribution (bookworm), this problem has been fixed in version 6.0.28+ds1-2+deb12u1. For the stable distribution (trixie), this problem has been fixed in version 7.0.28+ds1-1+deb13u1. We recommend that you upgrade your tryton-sao packages. For the detailed security status of tryton-sao please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tryton-sao Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: [email protected] -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmj6b4UACgkQEMKTtsN8 TjYbaA//V7VjHQtaBdEahtafmNmys9AnXLnFC4LiiVAQHte7GvWz2fGTyLlgPh3R 7aZKFF+/85hNlFYWm9eCjhu+GCSUevS/eOyQTlrSfxtEhtEpxwcw0CjI5qvJVwGh XSkJ4re+mBRMqN2YSBoXqz43SZNIWtKRJTc+c/dI4ezyhWB1o7cDn2jknM7EhVzF iNmjPpRAqoUOB/r9oM+rmm+ZvNx8FDrwM5spbdBdg4zQm9o2ONgtIshVGO+rl/SY Ca20iasdTgnh3AUF7Amw0hrfaqOW0BLibCMEhS9HfGiHAZuUxFxWr2PPra71SUTU kBVE5/52cg62BHFvwaMbmIDfFE8/g6VEqmATAwX9U4+lPgQzqeEqoaRa0avy8isQ lwpIfWYtEzFuYxqRAC+PjL173e2++BB/40l2glVKgo1xp7kVdK72KOP78Iribb2G 9fjNxZdAk8sgKZyQ6T6cxrRYvqAKUWcJrRpUVbrn9IndVVOfmsE0npDHRy1uSYoG TPQdl3K2mzs5mJxNn/bvkhdD71eCoUg3yUwQpKoariDTtr/SAfL+Sp9GkBTKpbiX AAmcX7x/ycZFFBVKmkGTy3mBzbqtx6FVB2KKrVMoepWGxkShR9SBOGs9j0j27dz9 hbY2R+m6WO7YRWSc/rGiWo3OtYgHxofDCmi/K7RiGsrTdjwxjpE= =CETo -----END PGP SIGNATURE-----

