---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for zope2.7 SECUNIA ADVISORY ID: SA21953 VERIFY ADVISORY: http://secunia.com/advisories/21953/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for zope2.7. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. For more information: SA21947 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3.dsc Size/MD5 checksum: 906 b4ea5636227d16c5df630894d2b76967 http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3.diff.gz Size/MD5 checksum: 51399 ee75bf3e88b6eb161ccc431e1077bce8 http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5.orig.tar.gz Size/MD5 checksum: 2885871 5b5c5823c62370d9f7325c6014a49d8b Alpha architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_alpha.deb Size/MD5 checksum: 2669566 2c4d8fb2ac3e9dba4f7de9caf0868b51 AMD64 architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_amd64.deb Size/MD5 checksum: 2661080 8108a298111e6abad30073cbd002093e ARM architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_arm.deb Size/MD5 checksum: 2616068 9d77c1ccce693668a3a7e2bb0f35491d HP Precision architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_hppa.deb Size/MD5 checksum: 2736774 1fd5611ff6fa57d561b15bae9d836fe7 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_i386.deb Size/MD5 checksum: 2608554 779c9e75c919a1d39d0db7a9a6fc14d9 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_ia64.deb Size/MD5 checksum: 2959538 d800e88a7a988d9bb0db833df57f074a Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_m68k.deb Size/MD5 checksum: 2601510 cdd9b090bf745ab74545361936b415c8 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_mips.deb Size/MD5 checksum: 2675666 260205e53eb3802ad50c4adcc8ac0d5f Little endian MIPS architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_mipsel.deb Size/MD5 checksum: 2678458 dc9af18e0027a9fb7ae507ff33e050b9 PowerPC architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_powerpc.deb Size/MD5 checksum: 2723958 90e0b09a7f8d299a60c09947b86a72e5 IBM S/390 architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_s390.deb Size/MD5 checksum: 2663150 a5f76f5bc20b8fde2ed6ffcf24dffa33 Sun Sparc architecture: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge3_sparc.deb Size/MD5 checksum: 2670708 66e3bd2e47d38d33bf951711e59f7592 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.8.8-2 (Debian GNU/Linux unstable alias sid does not contain zope2.7 packages anymore). ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1176 OTHER REFERENCES: SA21947: http://secunia.com/advisories/21947/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------