aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorDoug Barton <dougb@FreeBSD.org>2011-12-01 21:03:31 +0000
committerDoug Barton <dougb@FreeBSD.org>2011-12-01 21:03:31 +0000
commit3f91066eab70a06d38feb03c788b94847e0a44a4 (patch)
tree86520c10f5b9bfaf88da1fd224dfa2ee4e3e2539 /security
parentb98ad75f78958cd96a17ab1663275b0f3accf915 (diff)
downloadports-3f91066eab70a06d38feb03c788b94847e0a44a4.tar.gz
ports-3f91066eab70a06d38feb03c788b94847e0a44a4.zip
Update to version 3.4.8
This is the formal release of the fix to CVE-2011-4634, but there are no code differences from the preliminary fixes released in 3.4.8-rc1 except for the updated version number. PMSA-2011-18 has now been published; vuxml entry attached. PR: ports/163001 Submitted by: Matthew Seaman <m.seaman@infracaninophile.co.uk> (maintainer) Feature safe: yes
Notes
Notes: svn path=/head/; revision=286743
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml32
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index b829be0d987a..e49701264ee9 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -47,6 +47,38 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="ed536336-1c57-11e1-86f4-e0cb4e266481">
+ <topic>phpMyAdmin -- Multiple XSS</topic>
+ <affects>
+ <package>
+ <name>phpMyAdmin</name>
+ <range><gt>3.4</gt><lt>3.4.8.r1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The phpMyAdmin development team reports:</p>
+ <blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php">
+ <p>Using crafted database names, it was possible to produce
+ XSS in the Database Synchronize and Database rename
+ panels. Using an invalid and crafted SQL query, it was
+ possible to produce XSS when editing a query on a table
+ overview panel or when using the view creation dialog. Using
+ a crafted column type, it was possible to produce XSS in the
+ table search and create index dialogs.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php</url>
+ <cvename>CVE-2011-4634</cvename>
+ </references>
+ <dates>
+ <discovery>2011-11-24</discovery>
+ <entry>2011-12-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="eef56761-11eb-11e1-bb94-001c140104d4">
<topic>hiawatha -- memory leak in PreventSQLi routine</topic>
<affects>