[Git][security-tracker-team/security-tracker][master] 2 commits: Track fixes for tryton-server via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Nov 24 12:19:41 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
02a33aba by Salvatore Bonaccorso at 2025-11-24T13:19:27+01:00
Track fixes for tryton-server via unstable

- - - - -
8d2cbd74 by Salvatore Bonaccorso at 2025-11-24T13:19:27+01:00
Track fix for tryton-sao via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -113,19 +113,19 @@ CVE-2024-21923 (Incorrect default permissions in AMD StoreMI\u2122 could allow a
 CVE-2024-21922 (A DLL hijacking vulnerability in AMD StoreMI\u2122 could allow an atta ...)
 	TODO: check
 CVE-2025-XXXX [Export data does not enforce access rights]
-	- tryton-server <unfixed> (bug #1121243)
+	- tryton-server 7.0.40-1 (bug #1121243)
 	NOTE: https://discuss.tryton.org/t/security-release-for-issue-14366/8953
 	NOTE: https://foss.heptapod.net/tryton/tryton/-/issues/14366
 CVE-2025-XXXX [IDOR / Access Control Issue - Unauthorized Access to User Signatures]
-	- tryton-server <unfixed> (bug #1121241)
+	- tryton-server 7.0.40-1 (bug #1121241)
 	NOTE: https://discuss.tryton.org/t/security-release-for-issue-14364/8952
 	NOTE: https://foss.heptapod.net/tryton/tryton/-/issues/14364
 CVE-2025-XXXX [Information disclosure: unhandled KeyError returns full Python stack trace for unknown fields in JSON-RPC (model.party.party.create)]
-	- tryton-server <unfixed> (bug #1121242)
+	- tryton-server 7.0.40-1 (bug #1121242)
 	NOTE: https://discuss.tryton.org/t/security-release-for-issue-14354/8950
 	NOTE: https://foss.heptapod.net/tryton/tryton/-/issues/14354
 CVE-2025-XXXX [Stored XSS Vulnerability Found in Party Field Leading to Arbitrary JavaScript Execution]
-	- tryton-sao <unfixed> (bug #1121233)
+	- tryton-sao 7.0.40+ds1-1 (bug #1121233)
 	NOTE: https://discuss.tryton.org/t/security-release-for-issue-14363/8951
 	NOTE: https://foss.heptapod.net/tryton/tryton/-/issues/14363
 CVE-2025-13526 (The OneClick Chat to Order plugin for WordPress is vulnerable to Insec ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/b571f816b395f0e5fdac9db0a7f845d9a10d6cd2...8d2cbd74103308d549dcab14de336519e8f3690e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/b571f816b395f0e5fdac9db0a7f845d9a10d6cd2...8d2cbd74103308d549dcab14de336519e8f3690e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251124/95be7557/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list