Debian: 'zope' remote vulnerability

    Date07 May 2001
    CategoryDebian
    2496
    Posted ByLinuxSecurity Advisories
    A new Zope hotfix has been released which fixes a problem in ZClasses.
    
    ------------------------------------------------------------------------
    Debian Security Advisory DSA-055-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                         Wichert Akkerman
    May  7, 2001
    ------------------------------------------------------------------------
    
    
    Package        : zope
    Problem type   : remote unauthorized access
    Debian-specific: no
    
    A new Zope hotfix has been released which fixes a problem in ZClasses.
    The README for the 2001-05-01 hotfix describes the problem as `any user
    can visit a ZClass declaration and change the ZClass permission mappings
    for methods and other objects defined within the ZClass, possibly
    allowing for unauthorized access within the Zope instance.'
    
    This hotfix has been added in version 2.1.6-10, and we highly recommend
    that you upgrade your zope package immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.2 alias potato
    ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Source archives:
         http://security.debian.org/dists/stable/updates/main/source/zope_2.1.6-10.diff.gz
          MD5 checksum: b3fdfc267c5eb1ff8425563898c7cf40
         http://security.debian.org/dists/stable/updates/main/source/zope_2.1.6-10.dsc
          MD5 checksum: c54e4354a0de8cd47a988541fd33cec9
         http://security.debian.org/dists/stable/updates/main/source/zope_2.1.6.orig.tar.gz
          MD5 checksum: 6ec4320afd6925c24f9f1b5cd7c4d7c5
    
      Alpha architecture:
         http://security.debian.org/dists/stable/updates/main/binary-alpha/zope_2.1.6-10_alpha.deb
          MD5 checksum: 829a7766ee2b0610b15195e8f94e6c1c
    
      ARM architecture:
         http://security.debian.org/dists/stable/updates/main/binary-arm/zope_2.1.6-10_arm.deb
          MD5 checksum: 7964eeffa5419e4c57a26118fa2d6168
    
      Intel ia32 architecture:
         http://security.debian.org/dists/stable/updates/main/binary-i386/zope_2.1.6-10_i386.deb
          MD5 checksum: b47471e49ff7b6b90ed2aedafbf3d7cc
    
      Motorola 680x0 architecture:
         http://security.debian.org/dists/stable/updates/main/binary-m68k/zope_2.1.6-10_m68k.deb
          MD5 checksum: 77ffbbdc5abd26b64ba807645eecc358
    
      PowerPC architecture:
         http://security.debian.org/dists/stable/updates/main/binary-powerpc/zope_2.1.6-10_powerpc.deb
          MD5 checksum: 168dae24060cbc214d4b9e46fcbbc19e
    
      Sun Sparc architecture:
         http://security.debian.org/dists/stable/updates/main/binary-sparc/zope_2.1.6-10_sparc.deb
          MD5 checksum: eaebca293e5e597f6d9ec92744a07934
    
      These packages will be moved into the stable distribution on its next
      revision.
    
    For not yet released architectures please refer to the appropriate
    directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    --
    ----------------------------------------------------------------------------
    apt-get: deb  http://security.debian.org/ stable/updates main
    dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"8","type":"x","order":"1","pct":61.54,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":23.08,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":15.38,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.