summaryrefslogtreecommitdiff
path: root/www/zope211/distinfo (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Upgrade to 2.6.1Hye-Shik Chang2003-05-121-1/+1
| | | | | | | | PR: 52038 Submitted by: Miguel Mendez <flynn@energyhq.es.eu.org> Notes: svn path=/head/; revision=80729
* Updated to 2.6.0. Simon, you forgot to remove the temp files before makingAlan Eldridge2003-01-121-1/+1
| | | | | | | | | | the plist ;) PR: 46168 Submitted by: Simon 'corecode' Schubert <corecode@eikonww2.eikon.e-technik.tu-muenchen.de> Notes: svn path=/head/; revision=72978
* Upgrade to Zope 2.5.1Neil Blakey-Milner2002-05-081-3/+1
| | | | | | | | PR: ports/37763 Submitted by: HAYASHI Yasushi <yasi@yasi.to> Notes: svn path=/head/; revision=58725
* Implement the HotFix described atNeil Blakey-Milner2002-03-231-0/+1
| | | | | | | | | | | | | | | | | | | http://www.zope.org/Products/Zope/Hotfix_2002-03-01/README.txt which says: ``The issue involves the checking of security for objects with proxy roles. The context of the owner user that created the object with proxy roles was not being taken into account when determining access to the object with proxy roles. This flaw could allow users defined in subfolders of a site with sufficient privileges to access objects at higher levels in the site that they would not normally be able to access.'' PR: 36103 Submitted by: HAYASHI Yasushi <yasi@yasi.to> Notes: svn path=/head/; revision=56470
* Upgrade to 2.5.0 plus the security fix.Neil Blakey-Milner2002-02-051-1/+2
| | | | | | | | PR: ports/34430 Submitted by: HAYASHI Yasushi <yasi@yasi.to> Notes: svn path=/head/; revision=54249
* Upgrade to 2.4.2Neil Blakey-Milner2001-10-191-1/+1
| | | | Notes: svn path=/head/; revision=48965
* Upgrade to Zope 2.4.1.Neil Blakey-Milner2001-09-101-2/+1
| | | | Notes: svn path=/head/; revision=47599
* Acqusition context checking hotfixNeil Blakey-Milner2001-08-041-0/+1
| | | | | | | | | | | | ``The issue involves an error in the '_check_context' method of the AccessControl.User.BasicUser class. The bug made it possible to access Zope objects via acquisition that a user would not otherwise have access to. This issue could allow users with enough internal knowledge of Zope to perform actions higher in the object hierarchy than they should be able to.'' Notes: svn path=/head/; revision=45808
* Upgrade to 2.4.0.Vanilla I. Shu2001-07-251-2/+1
| | | | | | | Approved by: nbm Notes: svn path=/head/; revision=45493
* Update port to version 2.3.3.Jimmy Olgeni2001-07-041-1/+1
| | | | | | | Approved by: nbm Notes: svn path=/head/; revision=44764
* Update to Zope 2.3.2 + Hotfix 2001-05-01Neil Blakey-Milner2001-05-031-1/+2
| | | | Notes: svn path=/head/; revision=42207
* Upgrade to Zope 2.3.1!Neil Blakey-Milner2001-03-311-3/+1
| | | | Notes: svn path=/head/; revision=40657
* Apply Zope hotfix: Hotfix_2001-03-08Jimmy Olgeni2001-03-101-0/+1
| | | | | | | | | | | | | | | From the Zope site: The issue involves an error in the 'aq_inContextOf' method of objects that support acquisition. A recent change to the access validation machinery made this bug begin to affect security restrictions. The bug, with the change to validation, made it possible to access Zope objects via acquisition that a user would not otherwise have access to. This issue could allow users with enough internal knowledge of Zope to perform actions higher in the object hierarchy than they should be able to. Notes: svn path=/head/; revision=39416
* Apply a Zope hotfix, fixing a potential security problem.Neil Blakey-Milner2001-03-041-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | From the Zope hotfix: This hotfix addresses and important security issue that affects Zope versions up to and including Zope 2.3.1 b1. The issue is related to ZClasses in that a user with through-the-web scripting capabilities on a Zope site can view and assign class attributes to ZClasses, possibly allowing them to make inappropriate changes to ZClass instances. This patch also fixes problems in the ObjectManager, PropertyManager, and PropertySheet classes related to mutability of method return values which could be perceived as a security problem. We *highly* recommend that any Zope site running versions of Zope up to and including 2.3.1 b1 have this hotfix product installed to mitigate these issues if the site is accessible by untrusted users who have through-the-web scripting privileges. Notes: svn path=/head/; revision=39027
* Upgrade to Zope 2.3.0. It requires the recent change to python15 forNeil Blakey-Milner2001-01-291-1/+1
| | | | | | | the 'new' module. Notes: svn path=/head/; revision=37748
* Update to Zope 2.2.5Neil Blakey-Milner2001-01-181-4/+1
| | | | Notes: svn path=/head/; revision=37293
* Upgrade to Zope 2.2.4, with 2000-12-08, 2000-12-15a, and 2000-12-18Neil Blakey-Milner2000-12-201-3/+4
| | | | | | | | | | security hotfixes. All Zope users are encouraged to upgrade, or apply the hotfixes themselves. Notes: svn path=/head/; revision=36150
* Fix up my silly mistake of adding DIST_SUBDIR=zope at the last secondNeil Blakey-Milner2000-10-181-3/+3
| | | | | | | | | | after testing. PR: 22050 Submitted by: Taoka Fumiyoshi <fmysh@ga2.so-net.ne.jp> Notes: svn path=/head/; revision=33950
* Add two security hotfixes for Zope - more complex Zope internals stuffNeil Blakey-Milner2000-10-141-0/+2
| | | | | | | | | which allows people who may edit DTML to gain higher privilege, and those who have higher privilege in some areas of the Zope tree to gain it in other areas. Notes: svn path=/head/; revision=33844
* Upgrade to Zope 2.2.2Neil Blakey-Milner2000-09-191-1/+1
| | | | | | | Also allow zope to be installed by non-root. Notes: svn path=/head/; revision=32844
* Update to Zope 2.2.1.Neil Blakey-Milner2000-09-061-1/+1
| | | | | | | | | | | Zope shutdown bug fixed. Reported by: Marc Rassbach <marc@milestonerdl.com> Reported by: Jimmy Olgeni <olgeni@uli.it> Zope startup bug fixed (I think). Notes: svn path=/head/; revision=32350
* Update to 2.2.1b1, since there is a minor security problem in anythingNeil Blakey-Milner2000-08-151-1/+1
| | | | | | | beforehand. Notes: svn path=/head/; revision=31663
* Update to zope 2.2.0 to fix security hole.Kris Kennaway2000-08-051-1/+1
| | | | | | | | Submitted by: James Howard <howardjp@wam.umd.edu> PR: 20144 Notes: svn path=/head/; revision=31326
* Update to version 2.1.6.Steve Price2000-05-291-1/+1
| | | | | | | | PR: 18444 Submitted by: Thomas Hentschel <thomas@hentschel.net> Notes: svn path=/head/; revision=28863
* Initial import of zope version 2.0.0b5.Steve Price1999-11-011-0/+1
An object-based web application platform with database access. PR: 13324 Submitted by: Peter Cornelius <pcc@gmx.net> Notes: svn path=/head/; revision=22798