The generate_admin_password function in Cherokee before 1.2.99 uses time and PID values for seeding of a random number generator, which makes it easier for local users to determine admin passwords via a brute-force attack.
https://bugzilla.redhat.com/show_bug.cgi?id=713304
http://www.securityfocus.com/bid/49772
http://www.openwall.com/lists/oss-security/2011/06/06/21
http://www.openwall.com/lists/oss-security/2011/06/03/4
http://www.cherokee-project.com/download/LATEST_is_1.2.99/cherokee-1.2.99.tar.gz
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066222.html