Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 25 Jun 2012 01:10:44 +0000 (UTC)
From:      Jimmy Olgeni <olgeni@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/www/yaws Makefile distinfo pkg-plist ports/www/yaws/files patch-man_yaws.conf.5 patch-scripts__gen-yaws
Message-ID:  <201206250110.q5P1AiYK081416@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
olgeni      2012-06-25 01:10:44 UTC

  FreeBSD ports repository

  Modified files:
    www/yaws             Makefile distinfo pkg-plist 
    www/yaws/files       patch-man_yaws.conf.5 
  Added files:
    www/yaws/files       patch-scripts__gen-yaws 
  Log:
  Upgrade to version 1.93, which contains a security fix among other changes.
  
  From Erlyaws-list:
  
  "Use crypto:rand_bytes() instead of the cryptographically weak random
  module. Swedish security consultant and cryptographer Kalle
  Zetterlund discovered a way to - given a sequence of cookies produced
  by yaws_session_server - predict the next session id. Thus providing
  a gaping security hole into yaws servers that use the yaws_session_server
  to maintain cookie based HTTP sessions (klacke/kallez)"
  
  PR:             ports/169363
  Submitted by:   Kenji Rikitake <kenji.rikitake@acm.org>
  
  Revision  Changes    Path
  1.60      +11 -3     ports/www/yaws/Makefile
  1.40      +2 -2      ports/www/yaws/distinfo
  1.5       +4 -4      ports/www/yaws/files/patch-man_yaws.conf.5
  1.1       +20 -0     ports/www/yaws/files/patch-scripts__gen-yaws (new)
  1.37      +24 -4     ports/www/yaws/pkg-plist



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201206250110.q5P1AiYK081416>