diff options
author | Doug Barton <dougb@FreeBSD.org> | 2011-12-01 21:03:31 +0000 |
---|---|---|
committer | Doug Barton <dougb@FreeBSD.org> | 2011-12-01 21:03:31 +0000 |
commit | 3f91066eab70a06d38feb03c788b94847e0a44a4 (patch) | |
tree | 86520c10f5b9bfaf88da1fd224dfa2ee4e3e2539 /security | |
parent | b98ad75f78958cd96a17ab1663275b0f3accf915 (diff) | |
download | ports-3f91066eab70a06d38feb03c788b94847e0a44a4.tar.gz ports-3f91066eab70a06d38feb03c788b94847e0a44a4.zip |
Update to version 3.4.8
This is the formal release of the fix to CVE-2011-4634, but there are
no code differences from the preliminary fixes released in 3.4.8-rc1
except for the updated version number.
PMSA-2011-18 has now been published; vuxml entry attached.
PR: ports/163001
Submitted by: Matthew Seaman <m.seaman@infracaninophile.co.uk> (maintainer)
Feature safe: yes
Notes
Notes:
svn path=/head/; revision=286743
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index b829be0d987a..e49701264ee9 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -47,6 +47,38 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ed536336-1c57-11e1-86f4-e0cb4e266481"> + <topic>phpMyAdmin -- Multiple XSS</topic> + <affects> + <package> + <name>phpMyAdmin</name> + <range><gt>3.4</gt><lt>3.4.8.r1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The phpMyAdmin development team reports:</p> + <blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php"> + <p>Using crafted database names, it was possible to produce + XSS in the Database Synchronize and Database rename + panels. Using an invalid and crafted SQL query, it was + possible to produce XSS when editing a query on a table + overview panel or when using the view creation dialog. Using + a crafted column type, it was possible to produce XSS in the + table search and create index dialogs.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php</url> + <cvename>CVE-2011-4634</cvename> + </references> + <dates> + <discovery>2011-11-24</discovery> + <entry>2011-12-01</entry> + </dates> + </vuln> + <vuln vid="eef56761-11eb-11e1-bb94-001c140104d4"> <topic>hiawatha -- memory leak in PreventSQLi routine</topic> <affects> |