A flaw in trytond has been discovered:
The CVE-2016-1242 allows an authenticated user with write access to access any readable file on the system. By default, only the administrator group has such right access.
Created tryton tracking bugs for this issue:
Affects: fedora-all [bug 1374221]
Affects: epel-all [bug 1374222]
python-proteus-4.0.2-1.fc25, tryton-4.0.4-1.fc25, trytond-4.0.4-1.fc25, trytond-account-4.0.3-1.fc25, trytond-account-invoice-4.0.2-1.fc25, trytond-account-product-4.0.2-1.fc25, trytond-account-statement-4.0.2-1.fc25, trytond-company-4.0.3-1.fc25, trytond-google-maps-4.0.2-1.fc25, trytond-party-4.0.2-1.fc25, trytond-purchase-4.0.3-1.fc25, trytond-sale-4.0.3-1.fc25, trytond-stock-4.0.3-1.fc25 has been pushed to the Fedora 25 stable repository. If problems still persist, please make note of it in this bug report.
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.