Update bugzilla to 3.6.1 Additional fixes in the port (my PR 145810 from 18 Apr 2010) ================================================================== Since bugzilla 3.x the webserver group and the default database are defined in 'Bugzilla/Install/Localconfig.pm' (not in checksetup.pl) The follwing patch correct this, additional if Pg is the default and mysql is not selected as OPTIONS the default DB will be changed to Pg. Release Notes for 3.6.1 ================================================================== This release fixes two security issues. See the Security Advisory for details. In addition, the following important fixes/changes have been made in this release: * Using the "Change Columns" page would sometimes result in a plain-text page instead of HTML. (Bug 376044) * Extensions that have only templates and no code are now working. (Bug 562551) * install-module.pl has been fixed so that it installs modules properly on both new and old versions of Perl. (Bug 560318 and Bug 560330) * It is now possible to upgrade from 3.4 to 3.6 when using Oracle. (Bug 561379) * Editing a field value's name (using the Field Values admin control panel) wasn't working if the value was set as the default for that field. (Bug 561296) * If you had the noresolveonopenblockers parameter set, bugs couldn't be edited at all if they were marked FIXED and had any open blockers. (The parameter is only supposed to prevent changing bugs to FIXED, not modifying already-FIXED bugs.) (Bug 565314) * Some minor issues with Perl 5.12 were fixed (mostly warnings that Perl 5.12 was throwing). Bugzilla now supports Perl 5.12. Vulnerability Details http://www.bugzilla.org/security/3.2.6/ ================================================================== Class: Remote Information Disclosure Versions: 2.17.1 to 3.2.6, 3.3.1 to 3.4.6, 3.5.1 to 3.6, 3.7 Fixed In: 3.2.7, 3.4.7, 3.6.1, 3.7.1 Description: Normally, information about time-tracking (estimated hours, actual hours, hours worked, and deadlines) is restricted to users in the "time-tracking group". However, any user was able, by crafting their own search URL, to search for bugs based using those fields as criteria, thus possibly exposing sensitive time-tracking information by a user seeing that a bug matched their search. References: https://bugzilla.mozilla.org/show_bug.cgi?id=309952 CVE Number: CVE-2010-1204 Class: Local Information Disclosure Versions: 3.5.1 to 3.6, 3.7 Fixed In: 3.6.1, 3.7.1 Description: If $use_suexec was set to "1" in the localconfig file, then the localconfig file's permissions were set as world-readable by checksetup.pl. This allowed any user with local shell access to see the contents of the file, including the database password and the site_wide_secret variable used for CSRF protection. References: https://bugzilla.mozilla.org/show_bug.cgi?id=561797 CVE Number: CVE-2010-0180 Vulnerability Solutions ======================= The fix for these issues are included in the 3.2.7, 3.4.7, 3.6.1, and 3.7.1 releases. Upgrading to a release with the relevant fix will protect your installation from possible exploits of this issue.
Responsible Changed From-To: freebsd-ports-bugs->skv Over to maintainer (via the GNATS Auto Assign Tool)
State Changed From-To: open->closed Committed, thanks!
skv 2010-07-05 16:42:22 UTC FreeBSD ports repository Modified files: devel/bugzilla Makefile distinfo Log: Update to 3.6.1 Changes: http://www.bugzilla.org/releases/3.6.1/release-notes.html Security: http://www.vuxml.org/freebsd/f1331504-8849-11df-89b8-00151735203a.html PR: ports/148149 Submitted by: olli hauer <ohauer@gmx.de> Feature safe: yes Revision Changes Path 1.77 +7 -3 ports/devel/bugzilla/Makefile 1.40 +3 -3 ports/devel/bugzilla/distinfo _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"