Commit graph

14 commits

Author SHA1 Message Date
Olli Hauer
683622b34b - update german and russian bugzilla templates to official new versions
- remove hotfixes from german templates

Feature safe: yes
2012-11-16 09:03:34 +00:00
Olli Hauer
6342cae597 - fix german bugzilla templates (security fixes)
Feature safe: yes
2012-11-14 21:37:21 +00:00
Olli Hauer
f02b57b299 - update bugzilla language tempates 2012-09-05 19:05:54 +00:00
Olli Hauer
3c8085b82e - update bugzilla bugzilla3 and bugzilla42
- use new bugzilla@ address (members skv@, tota@, ohauer@)
- patch russian/japanese/german bugzilla and bugzilla templates
  so the reflect the security updates in the original templates
- patch german/bugzilla42 templates
- adopt new Makefile header

	vuxml: 6ad18fe5-f469-11e1-920d-20cf30e32f6d
	CVE: CVE-2012-3981
	https://bugzilla.mozilla.org/show_bug.cgi?id=785470
	https://bugzilla.mozilla.org/show_bug.cgi?id=785522
	https://bugzilla.mozilla.org/show_bug.cgi?id=785511
2012-09-01 20:16:06 +00:00
Olli Hauer
dc09050fa3 - update to official release (just published) 2012-07-29 09:58:08 +00:00
Olli Hauer
3dd9f49987 - patch language templates so they match current bugzilla.
- patch language templates so they match current bugzilla version.

  Patches are seen as workaround until official Version is released.
  Fix for bugzilla42 contains security updates.
2012-07-28 20:44:43 +00:00
Olli Hauer
863cbb267b - new port german/bugzilla42
- add patch to german/bugzilla so it reflects the security update
- adjust version number in tempplates (3,6,10 / 4.0.7)
2012-07-27 22:25:14 +00:00
Olli Hauer
5006d4c0cc - security update to bugzilla 3.0.9 and 4.0.6
- update russian/bugzilla3-ru template
- patch german templates so revision match and no warning is displayed
- add vuxml entry

Approved by:	skv (implicit)
Security:	https://bugzilla.mozilla.org/show_bug.cgi?id=728639
		https://bugzilla.mozilla.org/show_bug.cgi?id=745397
		CVE-2012-0465
		CVE-2012-0466
2012-04-21 17:37:42 +00:00
Olli Hauer
5e7bd302a1 - update to 4.0.5
Vulnerability Details
=====================

Class:       Cross-Site Request Forgery
Versions:    4.0.2 to 4.0.4, 4.1.1 to 4.2rc2
Fixed In:    4.0.5, 4.2
Description: Due to a lack of validation of the enctype form
             attribute when making POST requests to xmlrpc.cgi,
             a possible CSRF vulnerability was discovered. If a user
             visits an HTML page with some malicious HTML code in it,
             an attacker could make changes to a remote Bugzilla installation
             on behalf of the victim's account by using the XML-RPC API
             on a site running mod_perl. Sites running under mod_cgi
             are not affected. Also the user would have had to be
             already logged in to the target site for the vulnerability
             to work.
References:  https://bugzilla.mozilla.org/show_bug.cgi?id=725663
CVE Number:  CVE-2012-0453

Approved by:	skv (implicit)
2012-04-10 05:15:47 +00:00
Olli Hauer
d32de4623d - update german bugzilla templates 2012-02-13 21:14:34 +00:00
Olli Hauer
4b5ecd75e0 - update german bugzilla translations 2012-01-05 17:30:45 +00:00
Olli Hauer
1ef5a90018 - update german bugzilla language templates 2011-08-14 18:56:47 +00:00
Olli Hauer
d399de5688 - create missing (empty) directory (bugzilla) so checksetup does not fail
- use DIST_SUBDIR for bugzilla and all translations
- sort pkg-plist (genplist)

OK from bugzilla maintainers per PM.

PR:		ports/158766
Submitted by:	ohauer
2011-07-18 21:56:02 +00:00
Olli Hauer
869b4c1071 - add German localization for Bugzilla bug tracking system 2011-06-11 19:04:02 +00:00