Advisories
Mandriva Advisories
|
![]() |
Problem Description |
There is an issue involving security registration of "legacy" names for
certain object constructors such as the constructors for DTML Method
Objects. Security was not being applied correctly for the legacy
names, making it possible to call those constructors without the
permissions that should have been required. This vulnerability could
allow anonymous users with enough knowledge of Zope to instantiate new
DTML Method instances through the web.
Updated Packages |
Mandrakelinux 7.1
158514931ef45709eb9e6a1181315c69 7.1/RPMS/Zope-2.2.4-1.1mdk.i586.rpm aa822c27a5c1b82861c0df99c8838621 7.1/RPMS/Zope-components-2.2.4-1.1mdk.i586.rpm 9f7f6c230178f5b1a1b118c29f0ee097 7.1/RPMS/Zope-core-2.2.4-1.1mdk.i586.rpm 09578d3538f0d9d12eb4221aa267da4a 7.1/RPMS/Zope-pcgi-2.2.4-1.1mdk.i586.rpm b175db0d7c49c96a858b863571b6e7f3 7.1/RPMS/Zope-services-2.2.4-1.1mdk.i586.rpm ec458e29b19693c8349d9e55c27ce1e1 7.1/RPMS/Zope-zpublisher-2.2.4-1.1mdk.i586.rpm df431d6f2e981389e00b7baaebe29cf1 7.1/RPMS/Zope-zserver-2.2.4-1.1mdk.i586.rpm 91a3406c5004c1354813904f6ea3e2af 7.1/RPMS/Zope-ztemplates-2.2.4-1.1mdk.i586.rpm 0f8da0f86f646fc75c9089ca8cac21ba 7.1/SRPMS/Zope-2.2.4-1.1mdk.src.rpm
Mandrakelinux 7.2
87015b0d82a371962d261256a21bae4b 7.2/RPMS/Zope-2.2.4-1.1mdk.i586.rpm 89af46635e5623b84249d026d5561276 7.2/RPMS/Zope-components-2.2.4-1.1mdk.i586.rpm eb41d95f3af23a42cce0734f35d45203 7.2/RPMS/Zope-core-2.2.4-1.1mdk.i586.rpm 850a083af418a271222af824ee318079 7.2/RPMS/Zope-pcgi-2.2.4-1.1mdk.i586.rpm 324849749f3acd29de35da0b55988f23 7.2/RPMS/Zope-services-2.2.4-1.1mdk.i586.rpm e6e6ee18f785717b00664f7d85ad59e1 7.2/RPMS/Zope-zpublisher-2.2.4-1.1mdk.i586.rpm 629bcf3f95f2d50ec4ea3e2da100850b 7.2/RPMS/Zope-zserver-2.2.4-1.1mdk.i586.rpm 93340e405b7f9f3011cc4cde139b5d04 7.2/RPMS/Zope-ztemplates-2.2.4-1.1mdk.i586.rpm 0f8da0f86f646fc75c9089ca8cac21ba 7.2/SRPMS/Zope-2.2.4-1.1mdk.src.rpm
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.