On Fri, Oct 19, 2001 at 07:24:52PM -0400, Barry A. Warsaw wrote:
> 
> >>>>> "CVR" == Chuq Von Rospach <[EMAIL PROTECTED]> writes:
> 
>     CVR> Barry, I think you need to take a look at your cookie code,
>     CVR> and look for ways to bullet-proof it. It seems to have some
>     CVR> assumptions that I found out the hard way aren't safe.
> 
> This patch against Mailman 2.0.6 should be enough to prevent the core
> dumps.  If you haven't completed your upgrade yet, can you give it a
> try?
 
I've the same cookie problems than chuck except that mm's admin interface
returns a 500 error (no core dump, I have python 1.5.2)

Would that patch fix the failures in the admin script when a bad cookie
shows up?

> -------------------- snip snip --------------------
> Index: SecurityManager.py
> ===================================================================
> RCS file: /cvsroot/mailman/mailman/Mailman/SecurityManager.py,v
> retrieving revision 1.31.2.1
> diff -u -r1.31.2.1 SecurityManager.py
> --- SecurityManager.py        2001/07/25 18:07:51     1.31.2.1
> +++ SecurityManager.py        2001/10/19 23:23:12
> @@ -118,7 +118,7 @@
>          cookiedata = os.environ.get('HTTP_COOKIE')
>          if not cookiedata:
>              return 0
> -        c = Cookie.Cookie(cookiedata)
> +        c = Cookie.Cookie(cookiedata, net_setfunc=lambda x: x)
>          if not c.has_key(key):
>              return 0
>          # Undo the encoding we performed in MakeCookie() above
> 
> _______________________________________________
> Mailman-Developers mailing list
> [EMAIL PROTECTED]
> http://mail.python.org/mailman/listinfo/mailman-developers

-- 
Microsoft is to operating systems & security ....
                                      .... what McDonalds is to gourmet cooking
  
Home page: http://marc.merlins.org/   |   Finger [EMAIL PROTECTED] for PGP key

_______________________________________________
Mailman-Developers mailing list
[EMAIL PROTECTED]
http://mail.python.org/mailman/listinfo/mailman-developers

Reply via email to