[Bug 272380] www/gitea: Update to 1.19.4 (fixes security vulnerabilities)

From: <bugzilla-noreply_at_freebsd.org>
Date: Wed, 05 Jul 2023 11:36:22 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=272380

Fernando ApesteguĂ­a <fernape@FreeBSD.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|New                         |In Progress
           Assignee|ports-bugs@FreeBSD.org      |fernape@FreeBSD.org
                 CC|                            |fernape@FreeBSD.org

--- Comment #1 from Fernando ApesteguĂ­a <fernape@FreeBSD.org> ---
Thanks for the vuxml entry, is very appreciated!

A minor thing:

>>> Successful.
Checking if tidy differs...
... seems okay
Checking for space/tab...
--- /data/fernape_data/FreeBSD-repos/ports/security/vuxml/vuln-flat.xml
2023-07-05 13:33:08.077976000 +0200
+++ /data/fernape_data/FreeBSD-repos/ports/security/vuxml/vuln.xml.unexpanded  
2023-07-05 13:33:11.862756000 +0200
@@ -91,7 +91,7 @@
       <body xmlns="http://www.w3.org/1999/xhtml">
        <p>The Gitea team reports:</p>
        <blockquote cite="https://github.com/go-gitea/gitea/pull/25143">
-         <p>If redirect_to parameter has set value starting with 
+         <p>If redirect_to parameter has set value starting with
            \\example.com redirect will be created with header Location:
            /\\example.com that will redirect to example.com domain.</p>
        </blockquote>
... see above

there was an extra space after "with". Always run "make validate" from
security/vuxml.

No need to update a new patch!

-- 
You are receiving this mail because:
You are the assignee for the bug.