-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-6099-1                   [email protected]
https://www.debian.org/security/                       Moritz Muehlenhoff
January 14, 2026                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : python-parsl
CVE ID         : CVE-2026-21892

Viral Vaghela discovered an SQL injection vulnerability in Parsl, a
parallel scripting library for Python.

For the stable distribution (trixie), this problem has been fixed in
version 2025.01.13+ds-1+deb13u1.

We recommend that you upgrade your python-parsl packages.

For the detailed security status of python-parsl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-parsl

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----
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=48ji
-----END PGP SIGNATURE-----

Reply via email to