USN-229-1: Zope vulnerability
Posted on: 12/13/2005 06:42 PM

A new Zope vulnerability update is available for Ubuntu Linux. Here the announcement:

Ubuntu Security Notice USN-229-1 December 13, 2005
zope2.8 vulnerability

A security issue affects the following Ubuntu releases:

Ubuntu 5.10 (Breezy Badger)

The following packages are affected:


The problem can be corrected by upgrading the affected package to
version 2.8.1-5ubuntu0.1. In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

Zope did not deactivate the file inclusion feature when exposing
RestructuredText functionalities to untrusted users. A remote user
with the privilege of editing Zope webpages with RestructuredText
could exploit this to expose arbitrary files that can be read with the
privileges of the Zope server, or execute arbitrary Zope code.

Source archives:
Size/MD5: 12721 12280d0cc8ba16dc3565199620486f59
Size/MD5: 826 bef9b6d223a40195bc51d4d30b81f73d
Size/MD5: 5343921 0ec441a35175bb8d8c557b7d3c63f6f6

Architecture independent packages:
Size/MD5: 18484 956dae0711ab24cf2b58e69dc79856ce

amd64 architecture (Athlon64, Opteron, EM64T Xeon)
Size/MD5: 5521388 162861be153d25a7fb0319502fd4046b

i386 architecture (x86 compatible Intel/AMD)
Size/MD5: 5463616 17e5eaf3029498f507de22f7ff97ba24

powerpc architecture (Apple Macintosh G3/G4/G5)
Size/MD5: 5551644 e8ee35fca963b06fa6bab479785155ee

Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

Version: GnuPG v1.4.2 (GNU/Linux)


Printed from Linux Compatible (