Date: Mon, 25 Jun 2012 01:10:44 +0000 (UTC) From: Jimmy Olgeni <olgeni@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/www/yaws Makefile distinfo pkg-plist ports/www/yaws/files patch-man_yaws.conf.5 patch-scripts__gen-yaws Message-ID: <201206250110.q5P1AiYK081416@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
olgeni 2012-06-25 01:10:44 UTC FreeBSD ports repository Modified files: www/yaws Makefile distinfo pkg-plist www/yaws/files patch-man_yaws.conf.5 Added files: www/yaws/files patch-scripts__gen-yaws Log: Upgrade to version 1.93, which contains a security fix among other changes. From Erlyaws-list: "Use crypto:rand_bytes() instead of the cryptographically weak random module. Swedish security consultant and cryptographer Kalle Zetterlund discovered a way to - given a sequence of cookies produced by yaws_session_server - predict the next session id. Thus providing a gaping security hole into yaws servers that use the yaws_session_server to maintain cookie based HTTP sessions (klacke/kallez)" PR: ports/169363 Submitted by: Kenji Rikitake <kenji.rikitake@acm.org> Revision Changes Path 1.60 +11 -3 ports/www/yaws/Makefile 1.40 +2 -2 ports/www/yaws/distinfo 1.5 +4 -4 ports/www/yaws/files/patch-man_yaws.conf.5 1.1 +20 -0 ports/www/yaws/files/patch-scripts__gen-yaws (new) 1.37 +24 -4 ports/www/yaws/pkg-plist
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201206250110.q5P1AiYK081416>