it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Florian Weimer <fw AT deneb.enyo.de>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 2444-1] tryton-server security update
- Date: Thu, 29 Mar 2012 08:06:23 +0200
- List-archive: <https://service.piratenpartei.de/pipermail/it-securitynotifies>
- List-id: Sicherheitsankündigungen <it-securitynotifies.lists.piratenpartei.de>
- Old-return-path: <fw AT deneb.enyo.de>
- Priority: urgent
- Resent-date: Thu, 29 Mar 2012 06:07:32 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <1f6Iwj6zoIC.A.M1G.jw_cPB@liszt>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2444-1 security AT debian.org
http://www.debian.org/security/ Florian Weimer
March 29, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : tryton-server
Vulnerability : privilege escalation
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-0215
It was discovered that the Tryton application framework for Python
allows authenticated users to escalate their privileges by editing the
Many2Many field.
For the stable distribution (squeeze), this problem has been fixed in
version 1.6.1-2+squeeze1.
For the unstable distribution (sid), this problem has been fixed in
version 2.2.2-1.
We recommend that you upgrade your tryton-server packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJPc/0AAAoJEL97/wQC1SS+F5kH/0NGInrbXAk/UuCJh2zAgqbI
pqa1ggZkjLrCP0JiAe/dsRPq/lhd17CoZkPuekxwvI9HppkSWKtwWKCbEKtpcAos
VbJsZZ3TYqrZFJpBzQOFLXTd+Kou2XUFKPV741bfrKZP8CNCZQWZHx0yXmtorfGt
w6/4896Z2lQIPFwCvvseIp3umjFykEAb3WgmD6ZDYzkl6gNXvTRBk4Cd+RLDwKC5
6FFzDbAVI6VQWoO1sXU4qN2KkfqKDM7BQhWcuIXA0ZWn8WLWqNElvmBtagmi/yC4
yOxwoU8jwsV1zBNZMWy2U6NfntKvqVOq0tiE5+e3hCVJYiE5MLi7A7n7mgQF0/g=
=+fGV
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST AT lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster AT lists.debian.org
Archive: 87obrghrfk.fsf AT mid.deneb.enyo.de">http://lists.debian.org/87obrghrfk.fsf AT mid.deneb.enyo.de
- [IT-SecNots] [SECURITY] [DSA 2444-1] tryton-server security update, Florian Weimer, 29.03.2012
Archiv bereitgestellt durch MHonArc 2.6.19.