Update sysutils/webmin to version 1.930.

Contains fix for CVE-2019-15107.

From https://virtualmin.com/node/66890:

  To exploit the malicious code, your Webmin installation must have Webmin ->
  Webmin Configuration -> Authentication -> Password expiry policy set to
  Prompt users with expired passwords to enter a new one. This option is not
  set by default, but if it is set, it allows remote code execution.

PR:           239956
Submitted by: Bert JW Regeer <xistence@0x58.com>
Security:     CVE-2019-15107
This commit is contained in:
Jimmy Olgeni 2019-08-18 22:53:12 +00:00
parent 88e1d21229
commit 763c5b190a
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=509243
3 changed files with 850 additions and 787 deletions

View File

@ -2,8 +2,7 @@
# $FreeBSD$
PORTNAME= webmin
PORTVERSION= 1.900
PORTREVISION= 1
PORTVERSION= 1.930
CATEGORIES= sysutils
MASTER_SITES= http://download.webmin.com/updates/:up \
SF/webadmin/${PORTNAME}/${PORTVERSION}:sf

View File

@ -1,3 +1,3 @@
TIMESTAMP = 1543262271
SHA256 (webmin-1.900.tar.gz) = f2f252b116ec3a063440b4efe77fe89996d8d743aa6857db013ae6a34be7c62d
SIZE (webmin-1.900.tar.gz) = 29309930
TIMESTAMP = 1566166757
SHA256 (webmin-1.930.tar.gz) = f5789f180852d8bd3510b342cc968fba928ece6c940763a89dc0d8f059bde682
SIZE (webmin-1.930.tar.gz) = 30932910

File diff suppressed because it is too large Load Diff