-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3826-1 security@xxxxxxxxxx https://www.debian.org/security/ Salvatore Bonaccorso April 04, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tryton-server CVE ID : CVE-2017-0360 It was discovered that the original patch to address CVE-2016-1242 did not cover all cases, which may result in information disclosure of file contents. For the stable distribution (jessie), this problem has been fixed in version 3.4.0-3+deb8u3. For the unstable distribution (sid), this problem has been fixed in version 4.2.1-2. We recommend that you upgrade your tryton-server packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAljju8NfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0StVA//ezWfo/ezFDeoPQ1cu4q3co20fqjqGDfvHege2u7KC1C14yztlg8a17xY 0Qy0CRmx/Nx/9xSFYdeHlelhx2IN65Q7u4BHHGKjtYdLq2SWtvEGSqm5wAQOt5Ba vnaE5ghNbyfaxvsKGAh+emCmxob2+863ug6W8MQrl6a2B9ByJFHbzGvdQI7d6S5+ uzV3ucvp+I7xvE+Q4ouRK/W3dr4CGSFajscDLjePEKelqmJ4ZPrLWEXUfX5XnRF/ A9++/xOvMw77+EuNF47RTotduR44LlCPaAieragBjlUO/ekgpKrXVWu8qcshOlPQ ygZhqFwDd6ptvjIxcPkUxI8x4a7gVVUEmWHSW0EYkxeXuD3hk0XO/hZA7WmAXgp5 RvB5HK4DZPfS14wU28pbkgTjIO0VHB+kyPuNq1yiwuV7JG567guIAtD8Jn2p9pyw ljYkOP4bLvfa2ErBT4kyYZeKXz6bAhK0aOMSaMN61Pu0qpsUh7fG5SmNWuxBeTwC 08LQryYYfuEaOKQI5tHhFj+WYrhR/fT1N5FfcbLpcFFdwUo2ynsdtXmEsp1GiFw7 BUVgYBdWbKvy663JMPFCy2abwqYbUH9PRcHHj8PgHAup+9r0s4RAKYQGGz9cJQIr 9PB97Qc/DsWl8T//P00ArjvP9k/l46eiuCT1H6EZWzvp0jfBjZg= =7rby -----END PGP SIGNATURE-----