-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2946-1 [email protected] https://www.debian.org/lts/security/ Emilio Pozuelo Monfort March 11, 2022 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : tryton-proteus Version : 4.2.0-1+deb9u1 CVE ID : CVE-2022-26661 CVE-2022-26662 Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton application platform, which may result in information disclosure or denial of service. For Debian 9 stretch, these problems have been fixed in version 4.2.0-1+deb9u1. We recommend that you upgrade your tryton-proteus packages. For the detailed security status of tryton-proteus please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tryton-proteus Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAmIq9YgACgkQnUbEiOQ2 gwJ9jhAAxwp8zXRvjccqO2AkQdOLVroCWjSv2hhCkD53z/jP8cYOGGA3Bpyer2c1 BoPM3xHANbjqSnz3yuuqNqWy9uWyideVwS7uRuvA9lmnzYIy/05s/GrhAQiEsVxZ 42dxUND3OPMr1/8jZWlFn+v6EMjMGjftdcu3APNqYKGDvgg3gA0cfYbCRi5rsmFN k5fkmMAw3ksnUJRT0lqROU1rVBHR3wWQBcrWzzubfXrjWAQlsoqo08bpz3IyszEy 9CkV4EgfBff7Y5tz8/ESlx7gWXooCSRI4Ed+AbFX8wRs4IAubvC1eioXzjnwzyFV fRlC11WdHidWFVSSpJj0+RLsIKDJT2Ob2RtCJYrSGrFKF7NQWwKhyhgJdWm2Sc62 SIccJpFMQF5OCEZktvfKmSF3YbhAhBKTaEG8sFI7UKJX/c4gKyzMQaPw7J3TbTL0 5TZrt2ob7eT52X4c/vxrABzHMmPRK4R+yse5/bHIJaMk9Q1EKizChERm77tGQUAk 6qllD9FmMNc51GTZ6DLPqT2OAb4XpMwbSCHxs7su7c/eMQoqkOsDAxN+vygC1jsp hxliedSGIuB5bVQPl5AQ0PnoZtC8+YcV5mAR+gJ29kGS7Jf/5T0xPn8CMR+VwDt6 Hdl4d7SlWt3fpQl1DGfY2SX3hi6GKb9n2MpVoYxw2lR++pLlFb4= =HnIr -----END PGP SIGNATURE-----
