---------------------------------------------------------------------- Secunia customers receive relevant and filtered advisories. Delivery is done via different channels including SMS, Email, Web, and https based XML feed. http://corporate.secunia.com/trial/38/request/ ---------------------------------------------------------------------- TITLE: Debian update for zope2.7 SECUNIA ADVISORY ID: SA24713 VERIFY ADVISORY: http://secunia.com/advisories/24713/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for zope2.7. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks. For more information: SA24017 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5.orig.tar.gz Size/MD5 checksum: 2885871 5b5c5823c62370d9f7325c6014a49d8b http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4.diff.gz Size/MD5 checksum: 56167 685e49f63b9a702081892b6ed645089f http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4.dsc Size/MD5 checksum: 906 8c2978255c5b9aa7306a976690f2a1b9 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_alpha.deb Size/MD5 checksum: 2670996 accef51032d175ec661fdf8ee24fef02 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_amd64.deb Size/MD5 checksum: 2662496 e7ecf995badfbb26d04a9d2226733ef0 arm architecture (ARM) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_arm.deb Size/MD5 checksum: 2616846 cf77838bf9f58c4891c0bcbcbef3e4a2 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_hppa.deb Size/MD5 checksum: 2737962 48289387ae5aec6619c390472a711457 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_i386.deb Size/MD5 checksum: 2631626 b28fa77d6ad2819f60c231181e616ebd ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_ia64.deb Size/MD5 checksum: 2961068 94cb9c371e891a7b9618073b85f0b15d m68k architecture (Motorola Mc680x0) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_m68k.deb Size/MD5 checksum: 2602568 551415edf8048443e31ae622b3e4c20a mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_mips.deb Size/MD5 checksum: 2677104 5480833a55d7d52aec4468adf05ed543 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_mipsel.deb Size/MD5 checksum: 2679900 bd5a007af00fdf3bc6757aee775383a2 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_powerpc.deb Size/MD5 checksum: 2725358 c70d786cb6616b22a409c9423d7e89f0 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_s390.deb Size/MD5 checksum: 2664652 3cea3d42b498e00b5e581b6068d2fa28 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/z/zope2.7/zope2.7_2.7.5-2sarge4_sparc.deb Size/MD5 checksum: 2672100 19dc901aa2b4da6f945f84b176224c93 -- Debian GNU/Linux unstable alias sid -- Fixed in version 2.9.7-1. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00031.html OTHER REFERENCES: SA24017: http://secunia.com/advisories/24017/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------