-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.2057
                       tryton-server security update
                              31 August 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           tryton-server
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Linux variants
                   OpenBSD
Impact/Access:     Access Privileged Data -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-1242 CVE-2016-1241 

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3656

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running tryton-server check for an updated version of the software 
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3656-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
August 30, 2016                       https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : tryton-server
CVE ID         : CVE-2016-1241 CVE-2016-1242

Two vulnerabilities have been discovered in the server for the Tryton
application platform, which may result in information disclosure of
password hashes or file contents.

For the stable distribution (jessie), these problems have been fixed in
version 3.4.0-3+deb8u2.

For the unstable distribution (sid), these problems have been fixed in
version 4.0.4-1.

We recommend that you upgrade your tryton-server packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=b8/Y
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBV8Y1/ox+lLeg9Ub1AQi9KA//W7VYZ0weFsX3Wfoh0VYTBW28qlgnMsiy
ctM+QlIs6M4iLOTen0FTkETv1q0ohfsNJ80pLZck7UqSKSIo375XBWhe1RFUUG1c
0wbQsNYfI27Wqz9UQI8mabF7uwkcix79EXUsREeqZJF7JTP3hTSBfTC8dVNJNWRC
BH+/TGq8xUQYRbS/+0msR64nnxZzR5Rhlg9aSBecRZw9r7XtsW9FpA5wvYu4zcy4
L6hJ3jwohC8k8ctgq1bNopfjFlypyQfMaTPLh8N8Th0egnOUsk535E/+BL1/maVs
6X99RpWFGefdMk9kQRaI11vgqnYONJjqS5LpeK91L28dOsmYv8Yhzef3rFiUM3M5
7WgTTApSRDIouuf4EPRA2MHwC3TOPYD26fDxNPol6hAQEdjmqK+ulYkotTuqKwN6
OPrXAeyc1ZojxHeKQwLKUPkIHdO1soatkRic5ojurHzATwIBS+ZMQaRrYyJa3k8L
MAoUEB4E0jxtFPt/OLHY/b4gQolHmBrOKTTwAIhR0C3EB9peSDH2k3hNZz9neEuv
jUe8P2gja7k2AGaqLVtB10E+hKXAHSiEm9NwlXjWddh/0BWF++VTdb404XcjE25P
qGSCAKlTYWG/OVnOo3fgJ0H8Cq+YTibdLVQDGqzlFH2SxiG9STmpzu7KP/hrm90A
+HJZDl4ohDw=
=A5Zb
-----END PGP SIGNATURE-----