From 477c5a327ba5d99c5ff7a2be8cba6d0cc6a7ebc6 Mon Sep 17 00:00:00 2001 From: Oliver Eikemeier Date: Sat, 26 Jun 2004 15:07:21 +0000 Subject: Updating www/moinmoin to 1.2.2. MoinMoin 1.1 contains administrative group name privilege escalation vulnerability. Fix UnpicklingError in MoinMoin/userp.py. PR: 68365 Submitted by: TAOKA Fumiyoshi --- www/moinmoin/files/patch-user.py | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 www/moinmoin/files/patch-user.py (limited to 'www/moinmoin/files/patch-user.py') diff --git a/www/moinmoin/files/patch-user.py b/www/moinmoin/files/patch-user.py new file mode 100644 index 000000000000..c3592c98c022 --- /dev/null +++ b/www/moinmoin/files/patch-user.py @@ -0,0 +1,11 @@ +--- MoinMoin/user.py.orig Sun Jun 6 08:58:39 2004 ++++ MoinMoin/user.py Sat Jun 26 20:57:34 2004 +@@ -46,7 +46,7 @@ + userdictpickle = os.path.join(config.user_dir, "userdict.pickle") + try: + _name2id = pickle.load(open(userdictpickle)) +- except (UnpicklingError,IOError,EOFError,ValueError): ++ except (pickle.UnpicklingError,IOError,EOFError,ValueError): + _name2id = {} + id = _name2id.get(searchName, None) + if id is None: -- cgit v1.2.3