On behalf of Zope developer community I am pleased to announce the releases of 
Zope 4.6.1 and 5.2.1.

This bugfix release solves a few minor issues and also contains an important 
security fix, see below. For the full list of changes see the change logs at 
https://zope.readthedocs.io/en/4.x/changes.html#id1 and 
https://zope.readthedocs.io/en/latest/changes.html#id1

Installation instructions can be found at 
https://zope.readthedocs.io/en/4.x/INSTALL.html and 
https://zope.readthedocs.io/en/latest/INSTALL.html.

NOTE: These releases contain an expanded security fix that prevents remote code 
execution through TAL expressions. The first iteration of the security fix in 
Zope 4.6 and 5.2 did not catch all cases of unauthorized TAL path expression 
traversal. Just like the first fix, you will only ever be at risk if you allow 
untrusted users to add or edit Zope Page Template objects, which is a very 
unusual non-standard site configuration. For more details, see the security 
advisory at 
https://github.com/zopefoundation/Zope/security/advisories/GHSA-rpcg-f9q6-2mq6. 
A CVE has been requested through GitHub.

NOTE FOR PLONE USERS: Make sure to install the latest version of 
PloneHotfix20210518 first, which should appear shortly after this Zope release. 
See https://plone.org/security/hotfix/20210518. Don't install Zope 4.6.1 or 
5.2.1 into an existing Plone setup without testing. The security changes in 
Zope break some Plone add-ons that relied on the old insecure traversal 
behavior. PloneHotfix20210518 ensures support for those Plone add-ons.

Jens Vagelpohl

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
Zope maillist  -  Zope@zope.org
https://mail.zope.org/mailman/listinfo/zope
**   No cross posts or HTML encoding!  **
(Related lists -
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope-dev )

Reply via email to