Date: Tue, 21 Aug 2018 13:57:41 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 230800] devel/gogs: Fix open redirect vulnerability Message-ID: <bug-230800-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D230800 Bug ID: 230800 Summary: devel/gogs: Fix open redirect vulnerability Product: Ports & Packages Version: Latest Hardware: Any URL: https://github.com/gogs/gogs/issues/5364 OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: dg@syrec.org Attachment #196418 maintainer-approval+ Flags: Flags: merge-quarterly? Created attachment 196418 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D196418&action= =3Dedit patch file - Fix open redirect vulnerability in login action. Upstream report: https://github.com/gogs/gogs/issues/5364 Upstream patch: https://github.com/gogs/gogs/commit/1f247cf8139cb483276cd8dd06385a800ce9d4b2 QA: poudriere testport: OK (112a, 111a, 104i) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-230800-7788>