1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-31 05:41:08 +00:00

Update to version 3.4.8

This is the formal release of the fix to CVE-2011-4634, but there are
no code differences from the preliminary fixes released in 3.4.8-rc1
except for the updated version number.

PMSA-2011-18 has now been published; vuxml entry attached.

PR:		ports/163001
Submitted by:	Matthew Seaman <m.seaman@infracaninophile.co.uk> (maintainer)

Feature safe:	yes
This commit is contained in:
Doug Barton 2011-12-01 21:03:31 +00:00
parent b98ad75f78
commit 3f91066eab
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=286743
3 changed files with 35 additions and 3 deletions

View File

@ -6,7 +6,7 @@
#
PORTNAME= phpMyAdmin
DISTVERSION= 3.4.8-rc1
DISTVERSION= 3.4.8
CATEGORIES= databases www
MASTER_SITES= SF/${PORTNAME:L}/${PORTNAME}/${DISTVERSION}
DISTNAME= ${PORTNAME}-${DISTVERSION}-all-languages

View File

@ -1,2 +1,2 @@
SHA256 (phpMyAdmin-3.4.8-rc1-all-languages.tar.bz2) = a460686e7d2f101a50fb19cb23d16ee56d995393bfebcdeb56880936e7b060c8
SIZE (phpMyAdmin-3.4.8-rc1-all-languages.tar.bz2) = 4611013
SHA256 (phpMyAdmin-3.4.8-all-languages.tar.bz2) = 792a53d1904feed2bba0a613680af86fb4ca2ee8e94ba65ef92043c5c2d90604
SIZE (phpMyAdmin-3.4.8-all-languages.tar.bz2) = 4610153

View File

@ -47,6 +47,38 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="ed536336-1c57-11e1-86f4-e0cb4e266481">
<topic>phpMyAdmin -- Multiple XSS</topic>
<affects>
<package>
<name>phpMyAdmin</name>
<range><gt>3.4</gt><lt>3.4.8.r1</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The phpMyAdmin development team reports:</p>
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php">
<p>Using crafted database names, it was possible to produce
XSS in the Database Synchronize and Database rename
panels. Using an invalid and crafted SQL query, it was
possible to produce XSS when editing a query on a table
overview panel or when using the view creation dialog. Using
a crafted column type, it was possible to produce XSS in the
table search and create index dialogs.</p>
</blockquote>
</body>
</description>
<references>
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2011-18.php</url>
<cvename>CVE-2011-4634</cvename>
</references>
<dates>
<discovery>2011-11-24</discovery>
<entry>2011-12-01</entry>
</dates>
</vuln>
<vuln vid="eef56761-11eb-11e1-bb94-001c140104d4">
<topic>hiawatha -- memory leak in PreventSQLi routine</topic>
<affects>