aboutsummaryrefslogtreecommitdiffstats
path: root/www/zope211/distinfo
diff options
context:
space:
mode:
authornbm <nbm@FreeBSD.org>2001-03-04 18:32:18 +0800
committernbm <nbm@FreeBSD.org>2001-03-04 18:32:18 +0800
commitc32437a2576660c179ea613c015d8b5b25133885 (patch)
treea52979041ca5932d21d9f3d9f71fc9006ce35654 /www/zope211/distinfo
parent677dde1e59222f3efdb0b3b13443c1c8a87f2dd2 (diff)
downloadfreebsd-ports-graphics-c32437a2576660c179ea613c015d8b5b25133885.tar.gz
freebsd-ports-graphics-c32437a2576660c179ea613c015d8b5b25133885.tar.zst
freebsd-ports-graphics-c32437a2576660c179ea613c015d8b5b25133885.zip
Apply a Zope hotfix, fixing a potential security problem.
From the Zope hotfix: This hotfix addresses and important security issue that affects Zope versions up to and including Zope 2.3.1 b1. The issue is related to ZClasses in that a user with through-the-web scripting capabilities on a Zope site can view and assign class attributes to ZClasses, possibly allowing them to make inappropriate changes to ZClass instances. This patch also fixes problems in the ObjectManager, PropertyManager, and PropertySheet classes related to mutability of method return values which could be perceived as a security problem. We *highly* recommend that any Zope site running versions of Zope up to and including 2.3.1 b1 have this hotfix product installed to mitigate these issues if the site is accessible by untrusted users who have through-the-web scripting privileges.
Diffstat (limited to 'www/zope211/distinfo')
-rw-r--r--www/zope211/distinfo1
1 files changed, 1 insertions, 0 deletions
diff --git a/www/zope211/distinfo b/www/zope211/distinfo
index ba0860d0012..a24b333e3e7 100644
--- a/www/zope211/distinfo
+++ b/www/zope211/distinfo
@@ -1 +1,2 @@
MD5 (zope/Zope-2.3.0-src.tgz) = ffd467bc9da04564af10452a4bb520d1
+MD5 (zope/Hotfix_2001-02-23.tgz) = 9794180dd3d46e176cf150345f62e353