summaryrefslogtreecommitdiffstats
path: root/lang/ruby16/distinfo
diff options
context:
space:
mode:
authornbm <nbm@FreeBSD.org>2001-03-04 10:32:18 +0000
committernbm <nbm@FreeBSD.org>2001-03-04 10:32:18 +0000
commitc32437a2576660c179ea613c015d8b5b25133885 (patch)
treea52979041ca5932d21d9f3d9f71fc9006ce35654 /lang/ruby16/distinfo
parent677dde1e59222f3efdb0b3b13443c1c8a87f2dd2 (diff)
downloadFreeBSD-ports-c32437a2576660c179ea613c015d8b5b25133885.zip
FreeBSD-ports-c32437a2576660c179ea613c015d8b5b25133885.tar.gz
Apply a Zope hotfix, fixing a potential security problem.
From the Zope hotfix: This hotfix addresses and important security issue that affects Zope versions up to and including Zope 2.3.1 b1. The issue is related to ZClasses in that a user with through-the-web scripting capabilities on a Zope site can view and assign class attributes to ZClasses, possibly allowing them to make inappropriate changes to ZClass instances. This patch also fixes problems in the ObjectManager, PropertyManager, and PropertySheet classes related to mutability of method return values which could be perceived as a security problem. We *highly* recommend that any Zope site running versions of Zope up to and including 2.3.1 b1 have this hotfix product installed to mitigate these issues if the site is accessible by untrusted users who have through-the-web scripting privileges.
Diffstat (limited to 'lang/ruby16/distinfo')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud