It seems that Debian, on Agoust, made a security update on zope2.10,
zope2.11 and zope-common.

zope2.10 (this package)

zope2.11  (2.11.4-1) unstable; urgency=high

   * New upstream release, fixes two vulnerabilities in the ZEO network
     protocol: CVE-2009-0668 and CVE-2009-0669. (closes: #540463)
   * Add support to start a particular instance to initscript.
   * Bump pre-depends on zope-common to 0.5.49 and build-depends on debhelper
     to 0.3.14 to use invoke-rc.d in maintainer scripts. (closes: #540158)
   * Set urgency=high as this upload fixes two serious bugs.

 -- Jonas Meurer <m...@debian.org>  Sun, 09 Aug 2009 16:00:28 +0200

zope-common  (0.5.49) unstable; urgency=high

   * add zope2.12 to known zope releases in dzhandle.
   * bump standards-version to 3.8.2, noch changes needed.
   * bump debhelper compat level to 6.
   * add russian debconf translation, thanks to Yuri Kozlov. (closes: #539466)
   * add spanish debconf translation, thanks to Fernando González de Requena.
     (closes: #539588)
   * use 'invoke-rc.d zopeZVER restart INSTANCE=<name>' to restart pending zope
     instances in DZRestartPendingInstances.run().
   * add Breaks: zope2.7, zope2.8, zope2.9, zope2.10 (<< 2.10.9), zope2.11
     (<< 2.11.4) for that reason.
   * set urgency=high for that reason.

 -- Jonas Meurer <m...@debian.org>  Mon, 10 Aug 2009 14:44:40 +0200


Ubuntu, on karmic, synced only zope2.10 breaking the dependences on 
zope-common, this bug report.

For lucid I suggest a sync/merge with upstream.

For karmic?
A SRU with the right dependences closes this bug, but doesn't solve the bug 
mentioned on changelog.

How we proceed in this case?


** CVE added: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-0668

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2009-0669

-- 
Depends by zope-common version not available
https://bugs.launchpad.net/bugs/418008
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to