Date: Fri, 16 Oct 2020 20:27:24 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 249948] net-im/py-matrix-synapse: Update to 1.20.1 Message-ID: <bug-249948-7788-MsLkt1GCxx@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-249948-7788@https.bugs.freebsd.org/bugzilla/> References: <bug-249948-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D249948 Sascha Biberhofer <ports@skyforge.at> changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #218369|0 |1 is obsolete| | Attachment #218809| |maintainer-approval+ Flags| | --- Comment #2 from Sascha Biberhofer <ports@skyforge.at> --- Created attachment 218809 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D218809&action= =3Dedit net-im/py-matrix-synapse: update to 1.21.2 The synapse developers have released 1.21.0 and the subsequent minor updates 1.21.1 and 1.21.2 yesterday. This update includes a security update for an = XSS vulnerability, see [1] and [2]. I've updates the patch to bump the version = of the port to 1.21.2 and synced the dependencies with those required by upstr= eam. portlint: "OK" (3 Warnings, none new) testport: OK (poudriere: 121amd64) do-test: OK (Ran 1241 tests in 459.405s, PASSED (skips=3D13, successes=3D12= 28)) I've been testing the resulting package on my server and things seem to be running fine. I will also provide a vuxml entry for this issue. Cheers, Sascha [1] https://github.com/matrix-org/synapse/releases/tag/v1.21.2 [2] https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5r= mq --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-249948-7788-MsLkt1GCxx>