Debian 10219 Published by

The following updates has been released for Debian:

[DLA 70-1] tryton-server security update
[DSA 3046-1] mediawiki security update



[DLA 70-1] tryton-server security update

Package : tryton-server
Version : 1.6.1-2+squeeze2
CVE ID : CVE-2014-6633

duesenfranz discovered, that safe_eval in trytond could be used to execute
arbitrary commands, mainly via the webdav interface. The patches applied do not
allow double underscores in safe_eval and avoid double evaluation from inherit
with a different model.


[DSA 3046-1] mediawiki security update

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3046-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
October 05, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : mediawiki
CVE ID : CVE-2014-7295

It was reported that MediaWiki, a website engine for collaborative work,
allowed to load user-created CSS on pages where user-created JavaScript
is not allowed. A wiki user could be tricked into performing actions by
manipulating the interface from CSS, or JavaScript code being executed
from CSS, on security-wise sensitive pages like Special:Preferences and
Special:UserLogin. This update removes the separation of CSS and
JavaScript module allowance.

For the stable distribution (wheezy), this problem has been fixed in
version 1:1.19.20+dfsg-0+deb7u1.

For the unstable distribution (sid), this problem has been fixed in
version 1:1.19.20+dfsg-1.

We recommend that you upgrade your mediawiki packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/