diff options
| author | Maximilian Bosch <maximilian@mbosch.me> | 2022-04-14 11:29:19 +0200 |
|---|---|---|
| committer | Maximilian Bosch <maximilian@mbosch.me> | 2022-04-14 11:29:19 +0200 |
| commit | e633d427477c310891553b4218648e05da1db56c (patch) | |
| tree | d9d8b00b1897331dffb6d443aebca0b40e5d8305 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch | |
| parent | 7708fccf01e0cdc38ce020c30e5c84427c2bec8e (diff) | |
grafana: 8.4.5 -> 8.4.6
No-op release: https://github.com/grafana/grafana/releases/tag/v8.4.6
Yes, this is actually not really needed since we only provide the OSS
version of Grafana and the CVE in question is only exploitable on
Grafana enterprise, but I decided to perform this update to test the
update script I previously implemented in 7708fccf01e0cdc38ce020c30e5c84427c2bec8e.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions
