Date: Tue, 24 Jan 2017 08:28:53 +0000 (UTC) From: Matthew Seaman <matthew@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r432314 - head/security/vuxml Message-ID: <201701240828.v0O8Srg1000941@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: matthew Date: Tue Jan 24 08:28:53 2017 New Revision: 432314 URL: https://svnweb.freebsd.org/changeset/ports/432314 Log: Document security vulnerabilities fixed in phpMyAdmin 4.6.6 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Jan 24 06:30:15 2017 (r432313) +++ head/security/vuxml/vuln.xml Tue Jan 24 08:28:53 2017 (r432314) @@ -58,6 +58,100 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="7721562b-e20a-11e6-b2e2-6805ca0b3d42"> + <topic>phpMyAdmin -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>phpMyAdmin</name> + <range><ge>4.6.0</ge><lt>4.6.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The phpMyAdmin development team reports:</p> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-1/"> + <h3>Summary</h3> + <p>Open redirect</p> + <h3>Description</h3> + <p>It was possible to trick phpMyAdmin to redirect to + insecure using special request path.</p> + <h3>Severity</h3> + <p>We consider this vulnerability to be non critical.</p> + </blockquote> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-2/"> + <h3>Summary</h3> + <p>php-gettext code execution</p> + <h3>Description</h3> + <p>The php-gettext library can suffer to code + execution. However there is no way to trigger this inside + phpMyAdmin.</p> + <h3>Severity</h3> + <p>We consider this to be minor.</p> + </blockquote> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-3/"> + <h3>Summary</h3> + <p>DOS vulnerabiltiy in table editing</p> + <h3>Description</h3> + <p>It was possible to trigger recursive include operation by + crafter parameters when editing table data.</p> + <h3>Severity</h3> + <p>We consider this to be non critical.</p> + </blockquote> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-4/"> + <h3>Summary</h3> + <p>CSS injection in themes</p> + <h3>Description</h3> + <p>It was possible to cause CSS injection in themes by + crafted cookie parameters.</p> + <h3>Severity</h3> + <p>We consider this to be non critical.</p> + </blockquote> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-5/"> + <h3>Summary</h3> + <p>Cookie attribute injection attack</p> + <h3>Description</h3> + <p>A vulnerability was found where, under some + circumstances, an attacker can inject arbitrary values in + the browser cookies. This was incompletely fixed in <a href="https://www.phpmyadmin.net/security/PMASA-2016-18/">PMASA-2016-18</a>.</p> + <h3>Severity</h3> + <p>We consider this to be non-critical.</p> + </blockquote> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-6/"> + <h3>Summary</h3> + <p>SSRF in replication</p> + <h3>Description</h3> + <p>For a user with appropriate MySQL privileges it was + possible to connect to arbitrary host.</p> + <h3>Severity</h3> + <p>We consider this to be non-critical.</p> + </blockquote> + <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-7/"> + <h3>Summary</h3> + <p>DOS in replication status</p> + <h3>Description</h3> + <p>It was possible to trigger DOS in replication status by + specially crafted table name.</p> + <h3>Severity</h3> + <p>We consider this to be non critical.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.phpmyadmin.net/security/PMASA-2017-1</url> + <url>https://www.phpmyadmin.net/security/PMASA-2017-2</url> + <url>https://www.phpmyadmin.net/security/PMASA-2017-3</url> + <url>https://www.phpmyadmin.net/security/PMASA-2017-4</url> + <url>https://www.phpmyadmin.net/security/PMASA-2017-5</url> + <url>https://www.phpmyadmin.net/security/PMASA-2017-6</url> + <url>https://www.phpmyadmin.net/security/PMASA-2017-7</url> + <cvename>CVE-2015-8980</cvename> + </references> + <dates> + <discovery>2017-01-24</discovery> + <entry>2017-01-24</entry> + </dates> + </vuln> + <vuln vid="a4b7def1-e165-11e6-9d84-90e2ba9881c8"> <topic>Intel(R) NVMUpdate -- Intel(R) Ethernet Controller X710/XL710 NVM Security Vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201701240828.v0O8Srg1000941>