From owner-svn-ports-all@FreeBSD.ORG Sun Jun 30 20:49:34 2013 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 2BDBC1FE; Sun, 30 Jun 2013 20:49:34 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id 0EF5B1B68; Sun, 30 Jun 2013 20:49:34 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id r5UKnXt9027130; Sun, 30 Jun 2013 20:49:33 GMT (envelope-from matthew@svn.freebsd.org) Received: (from matthew@localhost) by svn.freebsd.org (8.14.7/8.14.5/Submit) id r5UKnXM7027127; Sun, 30 Jun 2013 20:49:33 GMT (envelope-from matthew@svn.freebsd.org) Message-Id: <201306302049.r5UKnXM7027127@svn.freebsd.org> From: Matthew Seaman Date: Sun, 30 Jun 2013 20:49:33 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r322099 - in head: databases/phpmyadmin security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 30 Jun 2013 20:49:34 -0000 Author: matthew Date: Sun Jun 30 20:49:32 2013 New Revision: 322099 URL: http://svnweb.freebsd.org/changeset/ports/322099 Log: Security update to 4.0.4.1 ChangeLog: http://sourceforge.net/projects/phpmyadmin/files/phpMyAdmin/4.0.4.1/phpMyAdmin-4.0.4.1-notes.html/view Advisory: http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php Security: 1b93f6fe-e1c1-11e2-948d-6805ca0b3d42 Modified: head/databases/phpmyadmin/Makefile head/databases/phpmyadmin/distinfo head/security/vuxml/vuln.xml Modified: head/databases/phpmyadmin/Makefile ============================================================================== --- head/databases/phpmyadmin/Makefile Sun Jun 30 19:23:35 2013 (r322098) +++ head/databases/phpmyadmin/Makefile Sun Jun 30 20:49:32 2013 (r322099) @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= phpMyAdmin -DISTVERSION= 4.0.4 +DISTVERSION= 4.0.4.1 CATEGORIES= databases www MASTER_SITES= SF/${PORTNAME:L}/${PORTNAME}/${DISTVERSION} DISTNAME= ${PORTNAME}-${DISTVERSION}-all-languages Modified: head/databases/phpmyadmin/distinfo ============================================================================== --- head/databases/phpmyadmin/distinfo Sun Jun 30 19:23:35 2013 (r322098) +++ head/databases/phpmyadmin/distinfo Sun Jun 30 20:49:32 2013 (r322099) @@ -1,2 +1,2 @@ -SHA256 (phpMyAdmin-4.0.4-all-languages.tar.xz) = e2e8ad0a2b4bf63bb62961f5489f4f7cfa1b9e39fd795d4566bb6c27f9856cf0 -SIZE (phpMyAdmin-4.0.4-all-languages.tar.xz) = 4411736 +SHA256 (phpMyAdmin-4.0.4.1-all-languages.tar.xz) = da15749b29d2a3011f9ad83e035f7d8a4f478a0b14179b1d3ea9441e8739c6bb +SIZE (phpMyAdmin-4.0.4.1-all-languages.tar.xz) = 4411500 Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Jun 30 19:23:35 2013 (r322098) +++ head/security/vuxml/vuln.xml Sun Jun 30 20:49:32 2013 (r322099) @@ -51,6 +51,38 @@ Note: Please add new entries to the beg --> + + phpMyAdmin -- Global variable scope injection + + + phpMyAdmin + 4.04.0.4.1 + + + + +

The phpMyAdmin development team reports:

+
+

The import.php script was vulnerable to GLOBALS variable + injection. Therefore, an attacker could manipulate any + configuration parameter.

+

This vulnerability can be triggered only by someone who + logged in to phpMyAdmin, as the usual token protection + prevents non-logged-in users from accessing the required + form.

+
+ +
+ + http://www.phpmyadmin.net/home_page/security/PMASA-2013-7.php + CVE-2013-4729 + + + 2013-06-30 + 2013-06-30 + +
+ apache-xml-security-c -- heap overflow during XPointer evaluation