[Bug 247720] net-im/py-matrix-synapse: Security update to 1.15.2

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Thu Jul 2 17:29:40 UTC 2020


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=247720

            Bug ID: 247720
           Summary: net-im/py-matrix-synapse: Security update to 1.15.2
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs at FreeBSD.org
          Reporter: ports at skyforge.at

Created attachment 216148
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=216148&action=edit
net-im/py-matrix-synapse: 1.14.0 to 1.15.2

The matrix developers have just released synapse 1.15.2 (see [1]), containing
security fixes for two vulnerabilities:

- A malicious homeserver could force Synapse to reset the state in a room to a
small subset of the correct state. This affects all Synapse deployments which
federate with untrusted servers. (96e9afe6)

- HTML pages served via Synapse were vulnerable to clickjacking attacks. This
predominantly affects homeservers with single-sign-on enabled, but all server
administrators are encouraged to upgrade. (ea26e9a9)

This patch bumps the port to the aforementioned version. It also adds
www/py-pyjwt to the test dependencies, which is necessary to make the testsuite
pass successfully.

portlint: "OK" (4 Warnings, none new)
testport: OK (poudriere: 121amd64)
do-test: OK (Ran 1063 tests in 327.652s, PASSED (skips=5, successes=1058))

The resulting port also runs fine on my server.

Cheers,
Sascha

[1] https://github.com/matrix-org/synapse/releases/tag/v1.15.2

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list