Fwd: [vendor-sec] Updated hotfix for Plone CVE 2007-5741
    Fabio Tranchitella 
    kobold at kobold.it
       
    Mon Nov 19 19:50:47 UTC 2007
    
    
  
Hi Thijs,
* 2007-11-19 20:39, Thijs Kinkhorst wrote:
> Thanks! Can you tell me a bit more about the impact of this, what were the 
> symptoms when using the previous fix?
There are two fixes:
1) The encoding for the cookies from and to base64 is done using the python
   binascii module instead of the encodestring and decodestring from the base64
   module. I suppose the job done by encodestring and decodestring could cause
   broken HTTP headers if you run Apache or Squid in front of your Zope instance,
   but I'm not sure as I didn't have such an issue on my installations.
2) The previous fix was missing a row for the monkey patching (run-time
   modification of an object). Without that row, the status messages ("Your
   changes have been saved" and things lake that) aren't translated.
Best regards,
-- 
Fabio Tranchitella                         http://www.kobold.it
Free Software Developer and Consultant     http://www.tranchitella.it
_____________________________________________________________________
1024D/7F961564, fpr 5465 6E69 E559 6466 BF3D 9F01 2BF8 EE2B 7F96 1564
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.alioth.debian.org/pipermail/pkg-zope-developers/attachments/20071119/64e87821/attachment.pgp 
    
    
More information about the pkg-zope-developers
mailing list