Debian Security Advisory DSA-3425-1 [email protected]
https://www.debian.org/security/ Luciano Bello
December 17, 2015 https://www.debian.org/security/faq
Package : tryton-server
CVE ID : CVE-2015-0861
Cédric Krier discovered a vulnerability in the server-side of Tryton, an
application framework written in Python. An aunthenticated malicious
user can write arbitrary values in record fields due missed checks of
access permissions when multiple records are written.
The oldstable distribution (wheezy) is not affected.
For the stable distribution (jessie), this problem has been fixed in
version 3.4.0-3+deb8u1.
For the unstable distribution (sid), this problem has been fixed in
version 3.8.1-1.
We recommend that you upgrade your tryton-server packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | all | tryton-server-doc | < 3.4.0-3+deb8u1 | tryton-server-doc_3.4.0-3+deb8u1_all.deb |
Debian | 8 | all | tryton-server | < 3.4.0-3+deb8u1 | tryton-server_3.4.0-3+deb8u1_all.deb |