Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Cross-Site Scripting in phpMyAdmin
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in phpMyAdmin
ID: FEDORA-2015-3287
Distribution: Fedora
Plattformen: Fedora 22
Datum: Mo, 9. März 2015, 11:24
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2206

Originalnachricht

Name        : phpMyAdmin
Product : Fedora 22
Version : 4.3.11.1
Release : 1.fc22
URL : http://www.phpmyadmin.net/
Summary : Handle the administration of MySQL over the World Wide Web
Description :
phpMyAdmin is a tool written in PHP intended to handle the administration of
MySQL over the World Wide Web. Most frequently used operations are supported
by the user interface (managing databases, tables, fields, relations, indexes,
users, permissions), while you still have the ability to directly execute any
SQL statement.

Features include an intuitive web interface, support for most MySQL features
(browse and drop databases, tables, views, fields and indexes, create, copy,
drop, rename and alter databases, tables, fields and indexes, maintenance
server, databases and tables, with proposals on server configuration, execute,
edit and bookmark any SQL-statement, even batch-queries, manage MySQL users
and privileges, manage stored procedures and triggers), import data from CSV
and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument Text
and Spreadsheet, Word, Excel, LATEX and others, administering multiple servers,
creating PDF graphics of your database layout, creating complex queries using
Query-by-example (QBE), searching globally in a database or a subset of it,
transforming stored data into any format using a set of predefined functions,
like displaying BLOB-data as image or download-link and much more...

-------------------------------------------------------------------------------
-
Update Information:

phpMyAdmin 4.3.11.1 (2015-03-04)
================================

- [security] Risk of BREACH attack, see PMASA-2015-1
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1198794 - CVE-2015-2206 phpMyAdmin: Risk of BREACH attack due to
reflected parameter (PMASA-2015-1)
https://bugzilla.redhat.com/show_bug.cgi?id=1198794
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update phpMyAdmin' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung