aboutsummaryrefslogtreecommitdiffstats
path: root/german/bugzilla
Commit message (Collapse)AuthorAgeFilesLines
* - update german bugzilla templatesohauer2013-02-212-3/+3
|
* - update german and russian bugzilla templates to official new versionsohauer2012-11-163-63/+7
| | | | | | - remove hotfixes from german templates Feature safe: yes
* - fix german bugzilla templates (security fixes)ohauer2012-11-152-4/+60
| | | | Feature safe: yes
* - update bugzilla language tempatesohauer2012-09-062-11/+7
|
* - update bugzilla bugzilla3 and bugzilla42ohauer2012-09-021-6/+10
| | | | | | | | | | | | | | - use new bugzilla@ address (members skv@, tota@, ohauer@) - patch russian/japanese/german bugzilla and bugzilla templates so the reflect the security updates in the original templates - patch german/bugzilla42 templates - adopt new Makefile header vuxml: 6ad18fe5-f469-11e1-920d-20cf30e32f6d CVE: CVE-2012-3981 https://bugzilla.mozilla.org/show_bug.cgi?id=785470 https://bugzilla.mozilla.org/show_bug.cgi?id=785522 https://bugzilla.mozilla.org/show_bug.cgi?id=785511
* - update to official release (just published)ohauer2012-07-294-63/+3
|
* - patch language templates so they match current bugzilla.ohauer2012-07-292-2/+30
| | | | | | | - patch language templates so they match current bugzilla version. Patches are seen as workaround until official Version is released. Fix for bugzilla42 contains security updates.
* - new port german/bugzilla42ohauer2012-07-282-4/+31
| | | | | - add patch to german/bugzilla so it reflects the security update - adjust version number in tempplates (3,6,10 / 4.0.7)
* - security update to bugzilla 3.0.9 and 4.0.6ohauer2012-04-221-0/+7
| | | | | | | | | | | | - update russian/bugzilla3-ru template - patch german templates so revision match and no warning is displayed - add vuxml entry Approved by: skv (implicit) Security: https://bugzilla.mozilla.org/show_bug.cgi?id=728639 https://bugzilla.mozilla.org/show_bug.cgi?id=745397 CVE-2012-0465 CVE-2012-0466
* - update to 4.0.5ohauer2012-04-102-3/+3
| | | | | | | | | | | | | | | | | | | | | | | Vulnerability Details ===================== Class: Cross-Site Request Forgery Versions: 4.0.2 to 4.0.4, 4.1.1 to 4.2rc2 Fixed In: 4.0.5, 4.2 Description: Due to a lack of validation of the enctype form attribute when making POST requests to xmlrpc.cgi, a possible CSRF vulnerability was discovered. If a user visits an HTML page with some malicious HTML code in it, an attacker could make changes to a remote Bugzilla installation on behalf of the victim's account by using the XML-RPC API on a site running mod_perl. Sites running under mod_cgi are not affected. Also the user would have had to be already logged in to the target site for the vulnerability to work. References: https://bugzilla.mozilla.org/show_bug.cgi?id=725663 CVE Number: CVE-2012-0453 Approved by: skv (implicit)
* - update german bugzilla templatesohauer2012-02-142-3/+3
|
* - update german bugzilla translationsohauer2012-01-062-3/+3
|
* - update german bugzilla language templatesohauer2011-08-152-3/+3
|
* - create missing (empty) directory (bugzilla) so checksetup does not failohauer2011-07-191-1/+0
| | | | | | | | | | - use DIST_SUBDIR for bugzilla and all translations - sort pkg-plist (genplist) OK from bugzilla maintainers per PM. PR: ports/158766 Submitted by: ohauer
* - add German localization for Bugzilla bug tracking systemohauer2011-06-125-0/+337