@@ -51,8 +51,53 @@
in between your version and this one, particularly the Upgrading
section of each version's release notes.
-
+
Updates in this 4.2.x Release
+
4.2.1
+
+
This release fixes one security issue. See the
+ Security Advisory
+ for details.
+
+
In addition, the following important fixes/changes have been made in this
+ release:
+
+
+
Due to a regression introduced when fixing CVE-2012-0453, if an XML-RPC
+ client sets the charset as part of its Content-Type header, we were
+ incorrectly rejecting the request. The header is now correctly parsed.
+ ([% terms.Bug %] 731219)
+
Email notifications about status changes in blockers were incorrectly
+ formatted. Several pieces of text were missing in the emails.
+ ([% terms.Bug %] 731586)
When using the QuickSearch box, complex queries are now parsed correctly.
+ It also behaves correctly with non-ASCII characters (such as é, ä, ü, etc.).
+ (
+ [% terms.Bugs %] 554819, 663377 and 730207)
+
The 'take' link besides the assignee field now works correctly when
+ the usemenuforusers parameter is turned on.
+ ([% terms.Bug %] 734997)
+
URLs in the 'Total' row at the bottom of tabular reports were broken
+ when JavaScript was enabled and a user field was used for the vertical
+ axis.
+ ([% terms.Bug %] 731323)
A new hook named buglist_column_joins has been added to let
+ extensions alter the Bugzilla::Search::COLUMN_JOINS hash.
+ Now more fields can be displayed as columns in buglists, in combination
+ with the already existing buglist_columns hook.
+ ([% terms.Bug %] 743991)
+
A new hook named admin_editusers_action has been added to let
+ extensions alter the behavior of editusers.cgi. This lets you add
+ new features to this script very easily.
+ ([% terms.Bug %] 730794)
A new hook named error_catch has been added to let extensions
+ alter the way errors are thrown.
+ ([% terms.Bug %] 745197)
A new hook named admin_editusers_action has been added to let
extensions alter the behavior of editusers.cgi. This lets you add
new features to this script very easily.
--
cgit v1.2.3-24-g4f1b
From af3e4c43b0ad6267669d2e987d6ae3acdde70253 Mon Sep 17 00:00:00 2001
From: Frédéric Buclin
Date: Wed, 18 Apr 2012 19:00:42 +0200
Subject: Bug 745397: (CVE-2012-0466) [SECURITY] The JS template for buglists
permits attackers to access all bugs that the victim can see r=glob a=LpSolit
---
template/en/default/list/list.js.tmpl | 37 -----------------------------------
1 file changed, 37 deletions(-)
delete mode 100644 template/en/default/list/list.js.tmpl
(limited to 'template/en')
diff --git a/template/en/default/list/list.js.tmpl b/template/en/default/list/list.js.tmpl
deleted file mode 100644
index 7e9664c43..000000000
--- a/template/en/default/list/list.js.tmpl
+++ /dev/null
@@ -1,37 +0,0 @@
-[%# The contents of this file are subject to the Mozilla Public
- # License Version 1.1 (the "License"); you may not use this file
- # except in compliance with the License. You may obtain a copy of
- # the License at http://www.mozilla.org/MPL/
- #
- # Software distributed under the License is distributed on an "AS
- # IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
- # implied. See the License for the specific language governing
- # rights and limitations under the License.
- #
- # The Original Code is the Bugzilla Bug Tracking System.
- #
- # The Initial Developer of the Original Code is Netscape Communications
- # Corporation. Portions created by Netscape are
- # Copyright (C) 1998 Netscape Communications Corporation. All
- # Rights Reserved.
- #
- # Contributor(s): Gervase Markham
- #%]
-
-// Note: only publicly-accessible bugs (those not in any group) will be
-// listed when using this JavaScript format. This is to prevent malicious
-// sites stealing information about secure bugs.
-
-bugs = new Array;
-
-[% FOREACH bug = bugs %]
- bugs[[% bug.bug_id %]] = [
- [% FOREACH column = displaycolumns %]
- "[%- bug.$column FILTER js -%]"[% "," UNLESS loop.last %]
- [% END %]
- ];
-[% END %]
-
-if (window.buglistCallback) {
- buglistCallback(bugs);
-}
--
cgit v1.2.3-24-g4f1b