[Bug 272380] www/gitea: Update to 1.19.4 (fixes security vulnerabilities)
Date: Wed, 05 Jul 2023 11:36:22 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=272380 Fernando ApesteguĂa <fernape@FreeBSD.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|New |In Progress Assignee|ports-bugs@FreeBSD.org |fernape@FreeBSD.org CC| |fernape@FreeBSD.org --- Comment #1 from Fernando ApesteguĂa <fernape@FreeBSD.org> --- Thanks for the vuxml entry, is very appreciated! A minor thing: >>> Successful. Checking if tidy differs... ... seems okay Checking for space/tab... --- /data/fernape_data/FreeBSD-repos/ports/security/vuxml/vuln-flat.xml 2023-07-05 13:33:08.077976000 +0200 +++ /data/fernape_data/FreeBSD-repos/ports/security/vuxml/vuln.xml.unexpanded 2023-07-05 13:33:11.862756000 +0200 @@ -91,7 +91,7 @@ <body xmlns="http://www.w3.org/1999/xhtml"> <p>The Gitea team reports:</p> <blockquote cite="https://github.com/go-gitea/gitea/pull/25143"> - <p>If redirect_to parameter has set value starting with + <p>If redirect_to parameter has set value starting with \\example.com redirect will be created with header Location: /\\example.com that will redirect to example.com domain.</p> </blockquote> ... see above there was an extra space after "with". Always run "make validate" from security/vuxml. No need to update a new patch! -- You are receiving this mail because: You are the assignee for the bug.