bugzilla upgrade from bugzilla 4.0.2 to 4.4.5

Hi When i ugrade bugzilla from 4.0.2 to 4.4.5 i am getin the below error 

Not a reference at Bugzilla/DB/Schema.pm line 2786.

How to resolve this.

i have few custom fields in my bugzilla 4.0.2 

New parameter: default_search_limit
The following parameters are no longer used in Bugzilla, and so have been
moved from your parameters file into ./data/old-params.txt:
usebugaliases, allow_attach_url, specific_search_allow_empty_words
Removing existing compiled templates...
Precompiling templates...done.
Fixing file permissions...
Populating new field_visibility table...
Deleting the 'visibility_value_id' column from the 'fielddefs' table...
Adding new column 'is_numeric' to the 'fielddefs' table...
Adding new column 'long_desc' to the 'fielddefs' table...
Initializing "Product/Component Changes" email_setting ...
Deleting the 'isurl' column from the 'attachments' table...
Adding new column 'isactive' to the 'components' table...
Adding new column 'isactive' to the 'versions' table...
Adding new column 'isactive' to the 'milestones' table...
Dropping foreign key: series.creator -> profiles.userid...
Removing index 'series_creator_idx' from the series table...
Adding new index 'series_creator_idx' to the series table ...
Adding new index 'series_category_idx' to the series table ...
Adding new column 'id' to the 'bug_see_also' table...
Populating the new 'tag' table:
....92/92 (100%)
Deleting the 'query_type' column from the 'namedqueries' table...
Adding new column 'class' to the 'bug_see_also' table...
Adding new column 'is_enabled' to the 'profiles' table...
Adding new column 'last_seen_date' to the 'profiles' table...
Updating column filename in table attachments ...
Old: varchar(100) NOT NULL
New: varchar(255) NOT NULL
Updating column bug_file_loc in table bugs ...
Old: mediumtext
New: mediumtext DEFAULT '' NOT NULL
Updating column cf_saleforce_id in table bugs ...
Old: mediumtext
New: varchar(255) DEFAULT '' NOT NULL
Updating column cf_home_id in table bugs ...
Old: varchar(255)
New: varchar(255) DEFAULT '' NOT NULL
Not a reference at Bugzilla/DB/Schema.pm line 2786.




Getting below error while submitting new bug on 4.4.5



Software error:
DBD::mysql::db selectall_arrayref failed: Unknown column 'bugs_activity.id'
in 'order clause' [for Statement "SELECT fielddefs.name AS field_name,
                   bugs_activity.bug_when, bugs_activity.removed AS old,
                   bugs_activity.added AS new, bugs_activity.attach_id,
                   bugs_activity.comment_id, bugs_activity.who
              FROM bugs_activity
        INNER JOIN fielddefs
                ON fielddefs.id = bugs_activity.fieldid
             WHERE bugs_activity.bug_id = ?
                   
          ORDER BY bugs_activity.bug_when, bugs_activity.id"] at
Bugzilla/BugMail.pm line 413
               
Bugzilla::BugMail::_get_diffs('Bugzilla::Bug=HASH(0x188ae1a0)', '2014-08-04
02:29:08', 'HASH(0x175653d0)') called at Bugzilla/BugMail.pm line 103
                Bugzilla::BugMail::Send(165317, 'HASH(0x18589470)') called
at /var/www/html/bugzilla/post_bug.cgi line 206

For help, please send mail to the webmaster (root@localhost), giving this
error message and the time and date of the error. 



Software error:
DBD::mysql::db selectall_arrayref failed: Unknown column 'bugs_activity.id'
in 'order clause' [for Statement "SELECT fielddefs.name AS field_name,
                   bugs_activity.bug_when, bugs_activity.removed AS old,
                   bugs_activity.added AS new, bugs_activity.attach_id,
                   bugs_activity.comment_id, bugs_activity.who
              FROM bugs_activity
        INNER JOIN fielddefs
                ON fielddefs.id = bugs_activity.fieldid
             WHERE bugs_activity.bug_id = ?
                   
          ORDER BY bugs_activity.bug_when, bugs_activity.id"] at
Bugzilla/BugMail.pm line 413
               
Bugzilla::BugMail::_get_diffs('Bugzilla::Bug=HASH(0xf1e3f00)', '2014-08-04
02:31:55', 'HASH(0xe2783d0)') called at Bugzilla/BugMail.pm line 103
                Bugzilla::BugMail::Send(165318, 'HASH(0xed02e90)') called at
/var/www/html/bugzilla/post_bug.cgi line 206

For help, please send mail to the webmaster (root@localhost), giving this
error message and the time and date of the error.


Thanks for your support.





--
View this message in context: http://mozilla.6506.n7.nabble.com/bugzilla-upgrade-from-bugzilla-4-0-2-to-4-4-5-tp321023.html
Sent from the Bugzilla - Users mailing list archive at Nabble.com.
0
Sriraman
8/8/2014 3:23:06 AM
mozilla.support.bugzilla 10156 articles. 0 followers. Post Follow

0 Replies
1488 Views

Similar Articles

[PageSpeed] 26

Reply:

Similar Artilces:

Recommendations and questions for bugzilla 3.0.8 and testopia 2.2 upgrade to Bugzilla 4.4.5 and Testopia 2.5
Hi. At work i have the projecto to upgrade bugzilla and testopia from bugzilla 3.0.8 and testopia 2.2 to latest version (bz 4.4.5 & testopia 2.5) but have a few questions; hope you can help. I see a lot of changes, but what the most significant? Is there a manual to upgrade? When i upgrade, my information on MySQL will be deleted? What do you recommend to havea nice upgrade and don't lose info? Thanks, regards. Guten Tag davidarredondolopez@gmail.com, am Freitag, 1. August 2014 um 02:33 schrieben Sie: > I see a lot of changes, but what the most significant? You ...

Upgrading bugzilla 4.0.4 to Bugzilla 4.4.9
Hi All, My current Bugzilla version is 4.0.4 , Now i need to upgrade to 4.4.9 . Is it possible to directly upgrade to 4.4.9 or should i need to apply all the patched. Please revert ASAP. Regards Santhosh Guten Tag santhosh kumar, am Mittwoch, 15. Juli 2015 um 15:06 schrieben Sie: > Is it possible to directly upgrade to 4.4.9 or should i need to apply all= the patched. You can upgrade directly to the most current stable version, which is 5.0.0 by the way, not 4.4.9 anymore. https://www.bugzilla.org/docs/4.4/en/html/upgrade.html > Please revert ASAP. This ...

Security advisory for Bugzilla 4.5.5, 4.4.5, 4.2.10, and 4.0.14
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Summary ======= Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issue has been discovered in Bugzilla: * An attacker can get access to some bug information using the victim's credentials using a specially crafted HTML page. All affected installations are encouraged to upgrade as soon as possible. Vulnerability Details ===================== Class: Cross Site Request Forgery Versions: 3.7.1 to 4.0.13, 4.1.1 to 4.2.9, 4.3.1 to 4.4.4, 4.5.1 to 4.5...

[ANN] Release of Bugzilla 4.5.5, 4.4.5, 4.2.10, and 4.0.14
Today we are releasing 4.4.5, 4.2.10, 4.0.14, and the unstable development snapshot 4.5.5. All releases fix a security issue found since the last release. Bugzilla 4.4.5 is our latest stable release. Bugzilla 4.4.5, 4.2.10 and 4.0.14 are security updates for the 4.4, 4.2, and the 4.0 branches, respectively. Note that 4.5.5 is an unstable development release and should not be used in production environments. We are not yet feature-frozen at this time so the features you see in 4.5.5 might not accurately represent the behavior that 5.0 will have. Note that when Bugzilla 5...

[ANN] Release of Bugzilla 4.5.4, 4.4.4, 4.2.9, and 4.0.13
Today we are releasing 4.4.4, 4.2.9, 4.0.13, and the unstable development snapshot 4.5.4. All releases fix a regression discovered since the last release. Bugzilla 4.4.4 is our latest stable release. Bugzilla 4.4.4, 4.2.9 and 4.0.13 are bug fix updates for the 4.4, 4.2, and the 4.0 branches, respectively. Note that 4.5.4 is an unstable development release and should not be used in production environments. We are not yet feature-frozen at this time so the features you see in 4.5.4 might not accurately represent the behavior that 5.0 will have. Note that when Bugzilla...

Security advisory for Bugzilla 4.5.6, 4.4.6, 4.2.11, and 4.0.15 #2
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Summary ======= Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issues have been discovered in Bugzilla: * The 'realname' parameter is not correctly filtered on user account creation, which could lead to user data override. * Several places were found in the Bugzilla code where cross-site scripting attacks could be used to access sensitive information. * Private comments can be shown to flagmail recipients who aren't in the insider group * Specially...

[ANN] Release of Bugzilla 4.5.1, 4.4.1, 4.2.7, and 4.0.11
Today we are releasing 4.4.1, 4.2.7, 4.0.11, and the unstable development snapshot 4.5.1. Initially, we released new tarballs and diffs for these releases to the download site but found a new bug shortly after. New tarballs and diffs have been uploaded to the site which we recommend everyone update to if you downloaded the first version. To make sure you have the fixed version, md5sum values are provided further down in the announcement. All of today's releases contain security fixes. We recommend all Bugzilla administrators to read the Security Advisory linked below. ...

[ANN] Release of Bugzilla 4.5.6, 4.4.6, 4.2.11, and 4.0.15
Today we are releasing 4.4.6, 4.2.11, 4.0.15, and the unstable development snapshot 4.5.6. All releases fix several security issues found since the last release. Bugzilla 4.4.6 is our latest stable release. Bugzilla 4.4.6, 4.2.11 and 4.0.15 are security updates for the 4.4, 4.2, and the 4.0 branches, respectively. Note that 4.5.6 is an unstable development release and should not be used in production environments. We are not yet feature-frozen at this time so the features you see in 4.5.5 might not accurately represent the behavior that 5.0 will have. Note that when Bug...

Security advisory for Bugzilla 4.5.3, 4.4.3, 4.2.8, and 4.0.12
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Summary ======= Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issues have been discovered in Bugzilla: * The login form had no CSRF protection, meaning that an attacker could force the victim to log in using the attacker's credentials. * Dangerous control characters can be inserted into Bugzilla, notably into bug comments, which can then be used to execute local commands. All affected installations are encouraged to upgrade as soon as possible. Vuln...

[ANN] Release of Bugzilla 4.5.3, 4.4.3, 4.2.8, and 4.0.12
Today we are releasing 4.4.3, 4.2.8, 4.0.12, and the unstable development snapshot 4.5.3. All of today's releases contain security fixes. We recommend all Bugzilla administrators to read the Security Advisory linked below. Bugzilla 4.4.3 is our latest stable release. It contains various useful bug fixes, performance improvements and security fixes for the 4.4 branch. Bugzilla 4.2.8 and 4.0.12 are security updates for the 4.2 branch and the 4.0 branches, respectively. 4.2.8 also contains several bug fixes. Note that 4.5.3 is an unstable development release a...

Security advisory for Bugzilla 4.5.6, 4.4.6, 4.2.11, and 4.0.15
Summary ======= Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issues have been discovered in Bugzilla: * The 'realname' parameter is not correctly filtered on user account creation, which could lead to user data override. * Several places were found in the Bugzilla code where cross-site scripting attacks could be used to access sensitive information. * Private comments can be shown to flagmail recipients who aren't in the insider group * Specially formatted values in a CSV search results export c...

Upgrading from bugzilla 4.0.3 to revision 4.4.4
Hi, I'm trying to upgrade from bugzilla 4.0.3 to bugzilla 4.4.4 on a windows Xp= environment. The first I'have done it's upgrade ActivePerl, then I copy bugzilla files. When I run checksetup.pl I get the next windows error, that can not find pe= rl510.dll (I have reomve ActivePerl 5.10.0 and installed 5.16.3) and next e= rrors: C: \ Bugzilla> checksetup.pl=20 Can not load 'C :/ Perl/site/lib/auto/Win32/Win32.dll' for module Win32: lo= ad_file: Can not find the specified module at C :/ Perl / lib / DynaLoader.= pm line 19 1.=20 =A0 at Bugzilla / Install...

[ANN] Release of Bugzilla 5.0rc1, 4.4.7, 4.2.12, and 4.0.16
Today we are announcing the first Release Candidate for Bugzilla 5.0, in addition to one new stable release and two security-only updates for the 4.2.x and 4.0.x series. Bugzilla 5.0rc1 is our first Release Candidate for Bugzilla 5.0. This release has received QA testing, and should be considerably more stable than the development releases before it. It is still not considered fully stable, and so you should understand that if you use it, you use it at your own risk. If feedback from this release candidate indicates that it is mostly stable, then Bugzilla 5.0 will be release...

[ANN] Release of Bugzilla 5.0rc2, 4.4.8, 4.2.13, and 4.0.17
Today we are announcing the second Release Candidate for Bugzilla 5.0, in addition to one new stable release and two bug fix updates for the 4.2.x and 4.0.x series. Bugzilla 5.0rc2 is our second Release Candidate for Bugzilla 5.0. This release has received QA testing, and should be considerably more stable than the development releases before it. It is still not considered fully stable, and so you should understand that if you use it, you use it at your own risk. If feedback from this release candidate indicates that it is mostly stable, then Bugzilla 5.0 will be released in...

Web resources about - bugzilla upgrade from bugzilla 4.0.2 to 4.4.5 - mozilla.support.bugzilla

Bugzilla - Wikipedia, the free encyclopedia
Bugzilla is a Web -based general-purpose bugtracker and testing tool originally developed and used by the Mozilla project, and licensed under ...

Bugzilla Main Page
This is the bug tracker for MediaWiki and its extensionsand site-specific problems on Wikimedia's wiki sites. Welcome to Bugzilla. To see what's ...

Critical Bugzilla vulnerability could give hackers access to undisclosed software flaws
Hackers could have had an inside track on unpatched flaws in major software projects because of a critical vulnerability in Bugzilla, a system ...

Bugzilla 0-day can reveal 0-day bugs in OSS giants like Mozilla, Red Hat
C Security firm Check Point Software Technologies used a flaw it discovered in the Perl programming language to hack into the popular Bugzilla ...

Mozilla loses more user info, this time data of 97,000 customers goes out through Bugzilla
... has come to light regarding the loss of another 97,000 emails and passwords that were left exposed. The latest issue comes via Bugzilla, and ...

Bugzilla, my first wiki
Bugzilla introduced me to the world of wikis. It took me a while to understand the power of wikis. But I remember years ago when I first used ...

Mozilla's Bugzilla Hacked, Exposing Firefox Zero-Days
The good news in this bad situation is that Firefox is already patched for all the issues.

Bugzilla Zero-Day Exposes Zero-Day Bugs
A previously unknown security flaw in Bugzilla — a popular online bug-tracking tool used by Mozilla and many of the open source Linux distributions ...

Critical Bugzilla vulnerability could give hackers access to undisclosed software flaws
Hackers could have had an inside track on unpatched flaws in major software projects because of a critical vulnerability in Bugzilla, a system ...

Bugzilla API - ProgrammableWeb
Bugzilla is the bug tracking and reporting system created and used by Mozilla. It is also available for use by other projects and organizations. ...

Resources last updated: 12/13/2015 4:36:51 AM