notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
All times are UTC
Ukraine
non port: german/bugzilla/Makefile
SVNWeb

Number of commits found: 17

Thu, 26 Sep 2013
[ 19:00 ohauer search for other commits by this committer ] Original commit   Revision:328405 (Only the first 10 of 14 ports in this commit are shown above. View all ports for this commit)
- add STAGE support to bugzilla ports
- remove bugzilla3 CONFLICTS
Fri, 20 Sep 2013
[ 18:30 bapt search for other commits by this committer ] Original commit   Revision:327732 (Only the first 10 of 42 ports in this commit are shown above. View all ports for this commit)
Add NO_STAGE all over the place in preparation for the staging support (cat:
german)
Thu, 21 Feb 2013
[ 08:48 ohauer search for other commits by this committer ] Original commit   Revision:312710
- update german bugzilla templates
Fri, 16 Nov 2012
[ 09:03 ohauer search for other commits by this committer ] Original commit   Revision:307474 (Only the first 10 of 15 ports in this commit are shown above. View all ports for this commit)
- update german and russian bugzilla templates to official new versions
- remove hotfixes from german templates

Feature safe: yes
Wed, 14 Nov 2012
[ 21:37 ohauer search for other commits by this committer ] Original commit   Revision:307430
- fix german bugzilla templates (security fixes)

Feature safe: yes
Wed, 5 Sep 2012
[ 19:05 ohauer search for other commits by this committer ] Original commit   Revision:303719
- update bugzilla language tempates
Sat, 1 Sep 2012
[ 20:16 ohauer search for other commits by this committer ] Original commit   Revision:303519 (Only the first 10 of 17 ports in this commit are shown above. View all ports for this commit)
- update bugzilla bugzilla3 and bugzilla42
- use new bugzilla@ address (members skv@, tota@, ohauer@)
- patch russian/japanese/german bugzilla and bugzilla templates
  so the reflect the security updates in the original templates
- patch german/bugzilla42 templates
- adopt new Makefile header

	vuxml: 6ad18fe5-f469-11e1-920d-20cf30e32f6d
	CVE: CVE-2012-3981
	https://bugzilla.mozilla.org/show_bug.cgi?id=785470
	https://bugzilla.mozilla.org/show_bug.cgi?id=785522
	https://bugzilla.mozilla.org/show_bug.cgi?id=785511
Sun, 29 Jul 2012
[ 09:58 ohauer search for other commits by this committer ] Original commit 
- update to official release (just published)
Sat, 28 Jul 2012
[ 20:44 ohauer search for other commits by this committer ] Original commit 
- patch language templates so they match current bugzilla.
- patch language templates so they match current bugzilla version.

  Patches are seen as workaround until official Version is released.
  Fix for bugzilla42 contains security updates.
Fri, 27 Jul 2012
[ 22:25 ohauer search for other commits by this committer ] Original commit 
- new port german/bugzilla42
- add patch to german/bugzilla so it reflects the security update
- adjust version number in tempplates (3,6,10 / 4.0.7)
Sat, 21 Apr 2012
[ 17:37 ohauer search for other commits by this committer ] Original commit  (Only the first 10 of 11 ports in this commit are shown above. View all ports for this commit)
- security update to bugzilla 3.0.9 and 4.0.6
- update russian/bugzilla3-ru template
- patch german templates so revision match and no warning is displayed
- add vuxml entry

Approved by:    skv (implicit)
Security:       https://bugzilla.mozilla.org/show_bug.cgi?id=728639
                https://bugzilla.mozilla.org/show_bug.cgi?id=745397
                CVE-2012-0465
                CVE-2012-0466
Tue, 10 Apr 2012
[ 05:15 ohauer search for other commits by this committer ] Original commit 
- update to 4.0.5

Vulnerability Details
=====================

Class:       Cross-Site Request Forgery
Versions:    4.0.2 to 4.0.4, 4.1.1 to 4.2rc2
Fixed In:    4.0.5, 4.2
Description: Due to a lack of validation of the enctype form
             attribute when making POST requests to xmlrpc.cgi,
             a possible CSRF vulnerability was discovered. If a user
             visits an HTML page with some malicious HTML code in it,
             an attacker could make changes to a remote Bugzilla installation
             on behalf of the victim's account by using the XML-RPC API
             on a site running mod_perl. Sites running under mod_cgi
             are not affected. Also the user would have had to be
             already logged in to the target site for the vulnerability
             to work.
References:  https://bugzilla.mozilla.org/show_bug.cgi?id=725663
CVE Number:  CVE-2012-0453

Approved by:    skv (implicit)
Mon, 13 Feb 2012
[ 21:14 ohauer search for other commits by this committer ] Original commit 
- update german bugzilla templates
Thu, 5 Jan 2012
[ 17:30 ohauer search for other commits by this committer ] Original commit 
- update german bugzilla translations
Sun, 14 Aug 2011
[ 18:56 ohauer search for other commits by this committer ] Original commit 
- update german bugzilla language templates
Mon, 18 Jul 2011
[ 21:56 ohauer search for other commits by this committer ] Original commit  (Only the first 10 of 12 ports in this commit are shown above. View all ports for this commit)
- create missing (empty) directory (bugzilla) so checksetup does not fail
- use DIST_SUBDIR for bugzilla and all translations
- sort pkg-plist (genplist)

OK from bugzilla maintainers per PM.

PR:             ports/158766
Submitted by:   ohauer
Sat, 11 Jun 2011
[ 19:04 ohauer search for other commits by this committer ] Original commit 
- add German localization for Bugzilla bug tracking system

Number of commits found: 17