The generate_admin_password function in Cherokee before 1.2.99 uses time and PID values for seeding of a random number generator, which makes it easier for local users to determine admin passwords via a brute-force attack.
code.google.com/p/cherokee/issues/detail?id=1212
lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html
www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz
www.openwall.com/lists/oss-security/2011/06/03/4
www.openwall.com/lists/oss-security/2011/06/06/21
www.securityfocus.com/bid/49772
bugzilla.redhat.com/show_bug.cgi?id=713304