The following updates has been released for Debian:
[DLA 70-1] tryton-server security update
[DSA 3046-1] mediawiki security update
[DLA 70-1] tryton-server security update
[DSA 3046-1] mediawiki security update
[DLA 70-1] tryton-server security update
Package : tryton-server
Version : 1.6.1-2+squeeze2
CVE ID : CVE-2014-6633
duesenfranz discovered, that safe_eval in trytond could be used to execute
arbitrary commands, mainly via the webdav interface. The patches applied do not
allow double underscores in safe_eval and avoid double evaluation from inherit
with a different model.
[DSA 3046-1] mediawiki security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3046-1 security@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
October 05, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : mediawiki
CVE ID : CVE-2014-7295
It was reported that MediaWiki, a website engine for collaborative work,
allowed to load user-created CSS on pages where user-created JavaScript
is not allowed. A wiki user could be tricked into performing actions by
manipulating the interface from CSS, or JavaScript code being executed
from CSS, on security-wise sensitive pages like Special:Preferences and
Special:UserLogin. This update removes the separation of CSS and
JavaScript module allowance.
For the stable distribution (wheezy), this problem has been fixed in
version 1:1.19.20+dfsg-0+deb7u1.
For the unstable distribution (sid), this problem has been fixed in
version 1:1.19.20+dfsg-1.
We recommend that you upgrade your mediawiki packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/