r2642 - in zope2.13/trunk/debian (3 files)

mejo at users.alioth.debian.org mejo at users.alioth.debian.org
Thu Jan 26 16:14:31 UTC 2012


    Date: Thursday, January 26, 2012 @ 16:14:29
  Author: mejo
Revision: 2642

remove patch and update to 2.13.2

Modified:
  zope2.13/trunk/debian/changelog
  zope2.13/trunk/debian/patches/series
Deleted:
  zope2.13/trunk/debian/patches/Zope2-fix_serious_authentication_vulnerability.patch

Modified: zope2.13/trunk/debian/changelog
===================================================================
--- zope2.13/trunk/debian/changelog	2012-01-19 01:16:52 UTC (rev 2641)
+++ zope2.13/trunk/debian/changelog	2012-01-26 16:14:29 UTC (rev 2642)
@@ -1,6 +1,5 @@
-zope2.13 (2.13.10-1) unstable; urgency=low
+zope2.13 (2.13.12-1) unstable; urgency=low
 
-  * NOT RELEASED YET.
   * New major upstream release (2.13).
     - Update build scripts for Zope2.13.
     - Bump python version from 2.6 to 2.7.
@@ -9,13 +8,8 @@
   * Update Homepage field to point to correct page http://zope2.zope.org/.
   * Change Depends on zope-common from (>= 0.5.51) to (>= 0.5.51~), to ease
     backports to squeeze.
-  * Add debian/patches/Zope2-fix_serious_authentication_vulnerability.patch,
-    fixing a serious authentication vulnerability in stock configuration.
-    No CVE number assigned yet.
-    See https://mail.zope.org/pipermail/zope-dev/2011-October/043592.html
-    for further information.
 
- -- Jonas Meurer <mejo at debian.org>  Fri, 28 Oct 2011 13:54:35 +0200
+ -- Jonas Meurer <mejo at debian.org>  Thu, 26 Jan 2012 17:12:06 +0100
 
 zope2.12 (2.12.20-1) unstable; urgency=low
 

Deleted: zope2.13/trunk/debian/patches/Zope2-fix_serious_authentication_vulnerability.patch
===================================================================
--- zope2.13/trunk/debian/patches/Zope2-fix_serious_authentication_vulnerability.patch	2012-01-19 01:16:52 UTC (rev 2641)
+++ zope2.13/trunk/debian/patches/Zope2-fix_serious_authentication_vulnerability.patch	2012-01-26 16:14:29 UTC (rev 2642)
@@ -1,47 +0,0 @@
-Description: Fix serious authentication vulnerability in stock configuration.
-Author: Zope Foundation and Contributors <zope-dev at zope.org>
-Last-Update: 2011-10-24
-
- 2.13.10 (2011-10-04)
- --------------------
---- a/source/Zope2/src/OFS/userfolder.py
-+++ b/source/Zope2/src/OFS/userfolder.py
-@@ -293,6 +293,8 @@
-                 message='Cannot change the id of a UserFolder',
-                 action='./manage_main'))
- 
-+InitializeClass(BasicUserFolder)
-+
- 
- class UserFolder(accesscontrol_userfolder.UserFolder, BasicUserFolder):
-     """Standard UserFolder object
---- a/source/Zope2/src/OFS/tests/test_userfolder.py
-+++ b/source/Zope2/src/OFS/tests/test_userfolder.py
-@@ -17,7 +17,15 @@
- # TODO class Test_readUserAccessFile(unittest.TestCase)
- 
- 
--# TODO class BasicUserFoldertests(unittest.TestCase)
-+class BasicUserFolderTests(unittest.TestCase):
-+ 
-+    def _getTargetClass(self):
-+        from OFS.userfolder import BasicUserFolder
-+        return BasicUserFolder
-+ 
-+    def test_manage_users_security_initialized(self):
-+        uf = self._getTargetClass()()
-+        self.assertTrue(hasattr(uf, 'manage_users__roles__'))
- 
- 
- class UserFolderTests(unittest.TestCase):
-@@ -171,6 +179,8 @@
- 
- 
- def test_suite():
--    suite = unittest.TestSuite()
--    suite.addTest(unittest.makeSuite(UserFolderTests))
-+    suite = unittest.TestSuite((
-+        unittest.makeSuite(BasicUserFolderTests),
-+        unittest.makeSuite(UserFolderTests),
-+    ))
-     return suite

Modified: zope2.13/trunk/debian/patches/series
===================================================================
--- zope2.13/trunk/debian/patches/series	2012-01-19 01:16:52 UTC (rev 2641)
+++ zope2.13/trunk/debian/patches/series	2012-01-26 16:14:29 UTC (rev 2642)
@@ -2,4 +2,3 @@
 Zope2-webdav_urljoin.patch
 Zope2-deb_zopeconf.patch
 ZODB3-fix_shebang.patch
-Zope2-fix_serious_authentication_vulnerability.patch




More information about the pkg-zope-developers mailing list