20 Commits

Author SHA1 Message Date
Sunpoet Po-Chuan Hsieh
0e04efec5a Update WWW: SF redirects to https://sourceforge.net/projects/<PROJECT_NAME>/ 2017-01-20 20:33:30 +00:00
Mathieu Arnold
4e1b79a0a6 Remove ${PORTSDIR}/ from dependencies, categories d, e, f, and g.
With hat:	portmgr
Sponsored by:	Absolight
2016-04-01 14:00:51 +00:00
Olli Hauer
f11cd932dd - fix against bugzilla 4.4.11
- use WRKSRC instead WRKDIR

MFH:		2015Q4
2015-12-23 11:27:34 +00:00
Olli Hauer
a634841e7b - update to 4.4.10 2015-09-29 17:09:24 +00:00
Olli Hauer
7bf5d6d9cb - update bugzilla ports to 5.0.1 / 4.4.10
o Users whose login name is not an email address could not log in on
  installations which use LDAP to authenticate users.
o If a mandatory custom field was hidden, it was not possible to create a
  new bug or to edit existing ones.
o A user editing his login name to point to a non-existent email address
  could cause Bugzilla to stop working, causing a denial of service.
o Emails generated during a transaction made PostgreSQL stop working.
o Bugs containing a comment with a reference to a bug ID larger than 2^31
  could not be displayed anymore using PostgreSQL.
o Emails sent by Bugzilla are now correctly encoded as UTF-8.
o The date picker in the "Time Summary" page was broken.
o If Test::Taint or any other Perl module required to use the JSON-RPC API
  was not installed or was too old, the UI to tag comments was displayed
  anyway, you could tag comments, but tags were not persistent (they were
  lost on page reload). Now the UI to tag comments is not displayed at all
  until the missing Perl modules are installed and up-to-date.
o Custom fields of type INTEGER now accept negative integers.

MFH:		2015Q3
Security:	CVE-2015-4499
Security:	ea893f06-5a92-11e5-98c0-20cf30e32f6d
2015-09-14 04:10:55 +00:00
Olli Hauer
071722e9aa - update to 4.4.9 2015-05-31 16:10:33 +00:00
Mathieu Arnold
60d1a83c2a MASTER_SITES cleanup.
- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
2015-05-14 10:15:04 +00:00
Olli Hauer
e5feee731c - adjust bugzilla revision to 4.4.7,
- bump PORTREVISION

MFH:            2015Q1
2015-01-27 21:34:51 +00:00
Olli Hauer
5ebb0c393f - adjust bugzilla revision to 4.4.7,
- bump PORTREVISION

MFH:		2015Q1
2015-01-26 20:31:22 +00:00
Olli Hauer
aeb64f7d23 - update to version 4.4.6
- adopt new pkg-plist style

MFH:		2014Q3
2014-10-14 20:47:56 +00:00
Florian Smeets
a8eed1046d Change MAINTAINER to bz-ports@ as discussed with bugzilla@ (now bz-ports@)
and bugmeister@. bugzilla@ will be used by bugmeister@ from now on.

Submitted by:	bugzilla (ohauer)
Approved by:	bugzilla (ohauer)
Hat:		postmaster
2014-09-05 23:09:27 +00:00
Olli Hauer
662c5586e8 - update to 4.4.5 2014-08-31 13:09:41 +00:00
Olli Hauer
9da6c85bed - better bugzilla revnum handling
- adjust bugzilla revision, there are no changes
  in bugzilla/templates/en

MFH:		2014Q3
2014-07-27 19:07:07 +00:00
Olli Hauer
654ffcd062 - update german bugzilla templates 2014-05-10 10:32:50 +00:00
Olli Hauer
172b0533e8 - update german bugzilla templates 2013-10-19 10:19:44 +00:00
Olli Hauer
de51be0645 - update to latest release [1]
- use PKGNAMESUFFIX instead LATEST_LINK
- whitespace cleanup
- svn mv */bugzilla to */bugzilla40
- add vuxml entry

4.4.1, 4.2.7, and 4.0.11 Security Advisory
Wednesday Oct 16th, 2013

Summary
=======

Bugzilla is a Web-based bug-tracking system used by a large number of
software projects. The following security issues have been discovered
in Bugzilla:

* A CSRF vulnerability in process_bug.cgi affecting Bugzilla 4.4 only
  can lead to a bug being edited without the user consent.

* A CSRF vulnerability in attachment.cgi can lead to an attachment
  being edited without the user consent.

* Several unfiltered parameters when editing flagtypes can lead to XSS.

* Due to an incomplete fix for CVE-2012-4189, some incorrectly filtered
  field values in tabular reports can lead to XSS.

All affected installations are encouraged to upgrade as soon as
possible.

[1]  even bugzilla40 gets upstream fixes an upgrade to bugzilla42/44 is recommend

Security:	vid e135f0c9-375f-11e3-80b7-20cf30e32f6d
		CVE-2013-1733
		CVE-2013-1734
		CVE-2013-1742
		CVE-2013-1743
2013-10-17 19:35:22 +00:00
Olli Hauer
c0e86f6715 - add STAGE support to bugzilla ports
- remove bugzilla3 CONFLICTS
2013-09-26 19:00:40 +00:00
Baptiste Daroussin
a285ade910 Add NO_STAGE all over the place in preparation for the staging support (cat: german) 2013-09-20 18:30:00 +00:00
Olli Hauer
a93bfceaf7 - fix build
Thanks to tijl@
2013-07-20 16:20:27 +00:00
Olli Hauer
dba4cdc6e5 New ports for bugzilla44
- devel/bugzilla44
- japanese/bugzilla44
- german/bugzilla44

Release Notes:
http://www.bugzilla.org/releases/4.4/release-notes.html
2013-06-20 22:21:36 +00:00