Date: Mon, 18 Dec 2000 17:50 -0500
From: [email protected]
To: [email protected]
Subject: [RHSA-2000:127-06] new Zope-Hotfix package available
Red Hat, Inc. Security Advisory Synopsis: new Zope-Hotfix package available Advisory ID: RHSA-2000:127-06 Issue date: 2000-12-18 Updated on: 2000-12-18 Product: Red Hat Powertools Keywords: Zope Hotfix Cross references:
1. Topic:
A new Zope-Hotfix package is availble which fixes issues with
computation of local roles.
2. Relevant releases/architectures:
Red Hat Powertools 6.1, 6.2 – noarch
Red Hat Powertools 7.0 – noarch
3. Problem description:
An issue with the computation of local roles exists where the
computation was not climbing the proper hierarchy of folders, and
sometimes granting local roles inappropriately.
You must update Zope to version 2.2.4 prior to applying this
update.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
After you have applied the update, restart Zope.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
for more info):
6. RPMs required:
Red Hat Powertools 6.1, 6.2:
SRPMS:
ftp://updates.redhat.com/powertools/6.2/SRPMS/Zope-Hotfix-localroles-2000_12_15a-1.src.rpm
ftp://updates.redhat.com/powertools/6.2/SRPMS/Zope-Hotfix-localroles-2000_12_15a-1.src.rpm
noarch:
ftp://updates.redhat.com/powertools/6.2/noarch/Zope-Hotfix-localroles-2000_12_15a-1.noarch.rpm
Red Hat Powertools 7.0:
SRPMS:
ftp://updates.redhat.com/powertools/7.0/SRPMS/Zope-Hotfix-localroles-2000_12_15a-1.src.rpm
noarch:
ftp://updates.redhat.com/powertools/7.0/noarch/Zope-Hotfix-localroles-2000_12_15a-1.noarch.rpm
7. Verification:
MD5 sum Package Name
0ee064e692aa83a908270aeed457c4f4 6.2/noarch/Zope-Hotfix-localroles-2000_12_15a-1.noarch.rpm a8b58411ed4e4c8238e9f05157f97516 7.0/noarch/Zope-Hotfix-localroles-2000_12_15a-1.noarch.rpm c2919cd6632903162d0787eade57fa6d 6.2/SRPMS/Zope-Hotfix-localroles-2000_12_15a-1.src.rpm c442a8969202ca347f450e179739e9bd 7.0/SRPMS/Zope-Hotfix-localroles-2000_12_15a-1.src.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm –checksig <filename>
If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg <filename>
8. References:
http://lwn.net/daily/zope-hotfix.php3
http://www.zope.org/Products/Zope/Hotfix_2000-12-15a/README.txt
Copyright(c) 2000 Red Hat, Inc.