Debian Security Advisory DSA 1405-3 (zope-cmfplone)

Summary
The remote host is missing an update to zope-cmfplone announced via advisory DSA 1405-3.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201405-3
Insight
The Plone developers discovered that their hotfix, released as DSA 1405, introduced two regressions. This update corrects these flaws. For completeness, the original advisory text below: It was discovered that Plone, a web content management system, allows remote attackers to execute arbitrary code via specially crafted web browser cookies. The oldstable distribution (sarge) is not affected by this problem. For the stable distribution (etch) this problem has been fixed in version 2.5.1-4etch3. For the unstable distribution (sid) this problem has been fixed in version 2.5.2-3. We recommend that you upgrade your zope-cmfplone package.