Debian: 'zope' vulnerability

    Date 20 Dec 2000
    Posted By LinuxSecurity Advisories
    A busy week for the Zope team: on Monday another security alert wasreleased revealing a potential problem found by Peter Kelly.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-007-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.                         Wichert Akkerman
    December 20, 2000
    - ------------------------------------------------------------------------
    Package        : zope
    Problem type   : insufficient protection
    Debian-specific: no
    A busy week for the Zope team: on Monday another security alert was
    released revealing a potential problem found by Peter Kelly. This
    problem involved incorrect protection of data updating for Image and
    File objects: any user with DTML editing privileges could update the
    File or Image object data directly.
    This has been fixed in version 2.1.6-5.4 by including the 2000-12-19
    hotfix, and we recommend that you upgrade your zope package immediately.
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    Debian GNU/Linux 2.2 alias potato
    - ---------------------------------
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
      Source archives:
          MD5 checksum: 85351d9b245c11f4ed7d95d26342f8f0
          MD5 checksum: c1e9b237ec2efa4a94a83e260c4dd550
          MD5 checksum: 6ec4320afd6925c24f9f1b5cd7c4d7c5
      Alpha architecture:
          MD5 checksum: 28f2b7e5a8d4a90587f38d1d62469d9b
      ARM architecture:
          MD5 checksum: 8fa39ea6aee3f0359a4dc128815da423
      Intel ia32 architecture:
          MD5 checksum: 0107b0c7104d3cb97db6f9afc18e2005
      Motorola 680x0 architecture:
          MD5 checksum: f5f30733f030880ccb22e323f96d4628
      PowerPC architecture:
          MD5 checksum: 116fb690e9681f4b8a8ce499b578f422
      Sun Sparc architecture:
          MD5 checksum: c96083f72ff1a554b1f6f94a90405f25
      These files will be moved into*/binary-$arch/ soon.
    For not yet released architectures please refer to the appropriate
    directory$arch/ .


    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"125","title":"Yes","votes":"38","type":"x","order":"1","pct":80.85,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":19.15,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.