Update sysutils/usermin to version 1.780.
Contains fix for CVE-2019-15107. From https://virtualmin.com/node/66890: To exploit the malicious code, your Webmin installation must have Webmin -> Webmin Configuration -> Authentication -> Password expiry policy set to Prompt users with expired passwords to enter a new one. This option is not set by default, but if it is set, it allows remote code execution. PR: 239957 Submitted by: Bert JW Regeer <xistence@0x58.com> Security: CVE-2019-15107
This commit is contained in:
parent
763c5b190a
commit
9fe42d2948
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=509244
@ -1,7 +1,7 @@
|
||||
# $FreeBSD$
|
||||
|
||||
PORTNAME= usermin
|
||||
PORTVERSION= 1.750
|
||||
PORTVERSION= 1.780
|
||||
CATEGORIES= sysutils
|
||||
MASTER_SITES= http://www.webmin.com/uupdates/:up \
|
||||
SF/webadmin/${PORTNAME}/${PORTVERSION}:sf \
|
||||
|
@ -1,3 +1,3 @@
|
||||
TIMESTAMP = 1549736295
|
||||
SHA256 (usermin-1.750.tar.gz) = ed2fe3885b651e45dd8c8938a732d81793bcc32111e135088c7f5d72a921ebf9
|
||||
SIZE (usermin-1.750.tar.gz) = 15798892
|
||||
TIMESTAMP = 1566166759
|
||||
SHA256 (usermin-1.780.tar.gz) = 6fc147e339106dbf3db5596b8712bf39a7e7181a15d329cad2b86e856fa7bc36
|
||||
SIZE (usermin-1.780.tar.gz) = 17676345
|
||||
|
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user