-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6061-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff November 25, 2025 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : tryton-sao CVE ID : not yet available Abdulfatah Abdillahi discovered a cross-site scripting vulnerability in the web client of the Tryton application platform. For the oldstable distribution (bookworm), this problem has been fixed in version 6.0.28+ds1-2+deb12u2. For the stable distribution (trixie), this problem has been fixed in version 7.0.28+ds1-1+deb13u2. We recommend that you upgrade your tryton-sao packages. For the detailed security status of tryton-sao please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tryton-sao Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: [email protected] -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmkmCx4ACgkQEMKTtsN8 Tjbjnw/+KcnzznsJLxQ5Wi933SNrLDzJRfiKg0+GD1fI0GiQsM+fd5pE24/kPSE9 I2whhNU8a45QhvR4mjnsEAQWuKGMmwwALI190OkGmAWXjefb1owvLTo1IurPcrop cZrpvMy9ls5+J5RiWjVBDI4nukdaYp/KI+Gbcfk00gF7WqXGvBJdRHQKU+DXInf/ vj39roBn2AqWpp9iCGvl4QjzFPbhrWQrSEI7F14nqthXe0AyTa5NXswQ4XBt46rV hRlUC6kKeZfD9QeKh7N4IKhc9xGd9QN5/4IGCbgiKcNc6B43bXvvydqwalTN5VWr lN7kYErw8bJSDMsSJmZvsyltvYTroftWFt+ertWuQJ7gSQJThtKkXKD9Ca94tOMo 14mZ0a7ClHqVVVA9TY8omde4cZepfAv+6pjabEaqqiKIKOCRNAW0gRYEbiAqmFVj 9V4RNEWIabh31JUgHHna/mUTVjiJx2/oRg36ermCbUcJww5xqVWSrxIOQD5iXLJv GQjLWrIDQ1vsJqDmWX1eIhMIHouPC3OqI9Ca4q1dGF4CpX5dIT3WIGmo5hQf89I5 zRD5+5nvDt7D3yRUcxuT/40XQa+WHDCXCL+nkN7z9mh4gmwMnM0o/ispP3ykrhK4 j84uav92fUfbtxeAiaBe8EEvFUtiU7mfJZq8ajtsEN7qtycusts= =l1Na -----END PGP SIGNATURE-----

