openbsd-ports/www/zope/distinfo
naddy 3ef18e1e59 SECURITY: Add hotfix; from matt@
The issue involves a vulnerability involving "through the web code"
inadvertently allowing an untrusted user to remotely shut down a
Zope server by allowing the user to inject special headers into the
response. If you allow untrusted users to write "through the web"
code like Python Scripts, DTML Methods, or Page Templates, your
Zope server is vulnerable.
2002-04-17 16:04:01 +00:00

10 lines
657 B
Plaintext

MD5 (Hotfix_2002-04-15.tgz) = 7cb0757cfd0867484f95764deff6506f
MD5 (Zope-2.5.1b1-src.tgz) = ad3679dbdd3e77064546b26388600e04
MD5 (Zope-2.5.1b1-unix-security.patch) = 70cc6d20bd372eb26eb7e3b72336167e
RMD160 (Hotfix_2002-04-15.tgz) = d1bffe484105474e07ac29af6b6b0b22d04f0521
RMD160 (Zope-2.5.1b1-src.tgz) = b59a2bdc1ee64a2bbaa9c46edb99a3549d140fc8
RMD160 (Zope-2.5.1b1-unix-security.patch) = 720c30638798ffc49818103655696355ee9bc8c8
SHA1 (Hotfix_2002-04-15.tgz) = f2d0aa8af7088fc125ed082ee5154d2182b6758b
SHA1 (Zope-2.5.1b1-src.tgz) = 99179e15ce4835aef23ebf4cd20fc762e02fe15e
SHA1 (Zope-2.5.1b1-unix-security.patch) = b95f66e840af2c32ad41256912871d90dbcbf62f