Update sysutils/webmin to version 1.930.
Contains fix for CVE-2019-15107. From https://virtualmin.com/node/66890: To exploit the malicious code, your Webmin installation must have Webmin -> Webmin Configuration -> Authentication -> Password expiry policy set to Prompt users with expired passwords to enter a new one. This option is not set by default, but if it is set, it allows remote code execution. PR: 239956 Submitted by: Bert JW Regeer <xistence@0x58.com> Security: CVE-2019-15107
This commit is contained in:
parent
88e1d21229
commit
763c5b190a
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=509243
@ -2,8 +2,7 @@
|
||||
# $FreeBSD$
|
||||
|
||||
PORTNAME= webmin
|
||||
PORTVERSION= 1.900
|
||||
PORTREVISION= 1
|
||||
PORTVERSION= 1.930
|
||||
CATEGORIES= sysutils
|
||||
MASTER_SITES= http://download.webmin.com/updates/:up \
|
||||
SF/webadmin/${PORTNAME}/${PORTVERSION}:sf
|
||||
|
@ -1,3 +1,3 @@
|
||||
TIMESTAMP = 1543262271
|
||||
SHA256 (webmin-1.900.tar.gz) = f2f252b116ec3a063440b4efe77fe89996d8d743aa6857db013ae6a34be7c62d
|
||||
SIZE (webmin-1.900.tar.gz) = 29309930
|
||||
TIMESTAMP = 1566166757
|
||||
SHA256 (webmin-1.930.tar.gz) = f5789f180852d8bd3510b342cc968fba928ece6c940763a89dc0d8f059bde682
|
||||
SIZE (webmin-1.930.tar.gz) = 30932910
|
||||
|
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user