Package: request-tracker4 / 4.0.7-5+deb7u4
Metadata
| Package | Version | Patches format |
|---|---|---|
| request-tracker4 | 4.0.7-5+deb7u4 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 01_layout | (download) |
config.layout |
27 27 + 0 - 0 ! |
add debian layout (fhs-compatible) |
| 04_sitemodules | (download) |
lib/RT/Interface/Web/Handler.pm |
1 1 + 0 - 0 ! |
use rt_sitemodules.pm in lib/rt/interface/web/handler.pm |
| 25_rt_setup_database_upgrade_basedir | (download) |
sbin/rt-setup-database.in |
2 1 + 1 - 0 ! |
fix relative references to config path |
| 30_no_syslogd_running | (download) |
lib/RT.pm |
14 12 + 2 - 0 ! |
a workaround for #469155 in liblog-dispatch-perl: don't die if syslogd isn't running this is important because we use RT.pm from the maintainer scripts through rt-setup-database, and the lack of syslogd shouldn't make them fail. . This patch should be kept until liblog-dispatch-perl >= 2.22-1 is in stable. |
| 40_versioned_use_webmux | (download) |
sbin/rt-server.in |
2 2 + 0 - 0 ! |
require the correct major version of rt to provide more helpful errors when the wrong version of RT is in @LIB (for example in a mod_perl context) |
| 55_no_testdeps | (download) |
Makefile.in |
2 1 + 1 - 0 ! |
don't run the testdeps portion of configuration |
| 60_rt_setup_database_no_dba_preset | (download) |
sbin/rt-setup-database.in |
4 1 + 3 - 0 ! |
[patch] revert "default to the configure-time dba in rt-setup-database" Bug-Debian: http://bugs.debian.org/637215 This reverts commit 2370ad8c83696fb51a54adff665c4cf947b44e49. |
| 65_rt_setup_fulltext_index_no_dba_preset | (download) |
sbin/rt-setup-fulltext-index.in |
2 1 + 1 - 0 ! |
[patch] revert "pull default dba from autoconf" Bug-Debian: http://bugs.debian.org/644093 This reverts commit e7f378895ec06e64bd056e1c966277aeee2ef6bd. |
| 66_sanity check stylesheets_shebang | (download) |
etc/upgrade/sanity-check-stylesheets.pl |
1 1 + 0 - 0 ! |
add missing interpreter to etc/upgrade/sanity-check-stylesheets.pl We install these scripts executable, so they need to have a valid interpreter. Bug: http://issues.bestpractical.com/Ticket/Display.html?id=18856 |
| 67_patchset 2012 10 10 | (download) |
lib/RT/Action/SendEmail.pm |
54 19 + 35 - 0 ! |
--- |
| 68_lock_transaction_updates | (download) |
lib/RT/Record.pm |
35 35 + 0 - 0 ! |
[patch] lock transaction updates so scrips get a consistent snapshot Previously, nothing prevented multiple transactions from being run on the system concurrently, and making identical changes. This could lead to multiple Corrrespondences, followed by multiple "Status changed from new to open" transactions. Prevent this by always running ->_NewTransaction in a database transaction, and ensuring that it takes a write lock on the row before running scrips and purges the cache. This ensures a coherent and serial execution of scrips. |
| 69_remove_unused_authenticate_method | (download) |
lib/RT/CurrentUser.pm |
40 0 + 40 - 0 ! |
[patch] remove the unused authenticate method This method was added as part of an Atom feature, the functionality of which was removed from core in ec3af9f and made into RTx-Atom, which rolls its own version of this method. |
| 70_patchset 2013 05 08 | (download) |
bin/rt.in |
10 4 + 6 - 0 ! |
--- |
| 71_lifecycle_warning | (download) |
lib/RT/Lifecycle.pm |
2 1 + 1 - 0 ! |
--- |
| 72_patchset 2015 02 05 | (download) |
lib/RT.pm |
2 2 + 0 - 0 ! |
[patch 1/3] hide utf8 warnings during attempted decoding EncodeFromToWithCroak is used to exploratorily attempt to decode unknown byte strings. This operation, under Encode::FB_DEFAULT, may generate warnings -- lots of warnings. This can lead to denial of service in some situations. This vulnerability has been assigned CVE-2014-9472. Unfortunately, "no warnings 'utf8'" does not work to quiet them until Encode 2.64; simply skip warnings of this type in the logging handler. |
| 73_CVE 2015 5475 | (download) |
share/html/NoAuth/js/util.js |
2 1 + 1 - 0 ! |
[patch] escape principal name as we insert it into the dom jQuery's text() setter method escapes the passed-in content. Using the original html() leaves us vulnerable to an XSS injection attack. This resolves CVE-2015-5475. |
