-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6099-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff January 14, 2026 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : python-parsl CVE ID : CVE-2026-21892 Viral Vaghela discovered an SQL injection vulnerability in Parsl, a parallel scripting library for Python. For the stable distribution (trixie), this problem has been fixed in version 2025.01.13+ds-1+deb13u1. We recommend that you upgrade your python-parsl packages. For the detailed security status of python-parsl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/python-parsl Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: [email protected] -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmlnSeIACgkQEMKTtsN8 TjZfsQ//T8DTxIfElE7bSRt8pGD8YTTDt7CfVow+0MCpVqMxEYm55gCYg981GdEh VdARVFKZE3hH+Ra1j8N+Bj4GgKi0592u3R1sAVf9ZgKw+ItkTIDAvrb6KqJ8/KLe 2xU4KVljV2v4aVJQLjETKVT7gr3jHzqYMb6i3uLJcALdvqmCiX7yaIXKpIii+SiK Iu/PmYnCa5HdcP0NGbdZV5v7vYCt7Ime7XUQI7Fwo519B0ihlkHJVqCdbTkfYIOu mrkzgfMzvtYfvCUJAc53qKWfEbeWZiGQI3h4uBouNsW+i7cOfwWVVlhaaeQ7gf52 gqnrHhlLXIL1gf6bcObpWztYDmRwMJbBaBAl+1uDcAG3RydL01QJeyyTQiasoUAK oJUWc3a80rJGJ32+vXaafjPrDGR+yEJLymBiygybN/zJeNX28X0JKKH9Do7QYp5d hz8U4W9jxNr6Ul2Vv8YReHd7/HOWsKc8GgG+lMUlFEjVs/rH17QJUwN6P+65JHQ8 U+kMYpFNPJXersn6zCUKFL1t1VClo9Dtiz+Lgw6AVGpddlQW27v89TrZMZEPz11c MVNijonyxFRN2i3fqeuJXGxBll2HLB2+4UaUCKZpi5cgxNCtA3mnwVDaJeK1F4ji Bell+biyVGQLN2e504KDcqlxx1ItIOOBaHQKgUACHrLvkC74kjU= =48ji -----END PGP SIGNATURE-----

