Sicherheit: Zwei Probleme in phpMyAdmin
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in phpMyAdmin
ID: FEDORA-2014-9534
Distribution: Fedora
Plattformen: Fedora 19
Datum: Fr, 29. August 2014, 08:42
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5273
Applikationen: phpMyAdmin


Name        : phpMyAdmin
Product : Fedora 19
Version :
Release : 1.fc19
URL : http://www.phpmyadmin.net/
Summary : Handle the administration of MySQL over the World Wide Web
Description :
phpMyAdmin is a tool written in PHP intended to handle the administration of
MySQL over the World Wide Web. Most frequently used operations are supported
by the user interface (managing databases, tables, fields, relations, indexes,
users, permissions), while you still have the ability to directly execute any
SQL statement.

Features include an intuitive web interface, support for most MySQL features
(browse and drop databases, tables, views, fields and indexes, create, copy,
drop, rename and alter databases, tables, fields and indexes, maintenance
server, databases and tables, with proposals on server configuration, execute,
edit and bookmark any SQL-statement, even batch-queries, manage MySQL users
and privileges, manage stored procedures and triggers), import data from CSV
and SQL, export data to various formats: CSV, SQL, XML, PDF, OpenDocument Text
and Spreadsheet, Word, Excel, LATEX and others, administering multiple servers,
creating PDF graphics of your database layout, creating complex queries using
Query-by-example (QBE), searching globally in a database or a subset of it,
transforming stored data into any format using a set of predefined functions,
like displaying BLOB-data as image or download-link and much more...

Update Information:

phpMyAdmin (2014-08-17)

- [security] XSS in table browse page
- [security] Self-XSS in enum value editor
- [security] Self-XSSes in monitor
- [security] Self-XSS in query charts
- [security] XSS in view operations page
- [security] XSS in relation view

* Mon Aug 18 2014 Robert Scheck <robert@fedoraproject.org>
- Upgrade to (#1130865, #1130866, #1131104)
* Thu Jul 31 2014 Robert Scheck <robert@fedoraproject.org> 4.2.7-1
- Upgrade to 4.2.7
* Sat Jul 19 2014 Robert Scheck <robert@fedoraproject.org> 4.2.6-1
- Upgrade to 4.2.6 (#548260, #959946, #989660, #989668, #993613
and #1000261, #1067713, #1110877, #1117600, #1117601)
- Switch from HTTP- to cookie-based authentication (for php-fpm)
* Sat Jun 7 2014 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> -
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Thu Dec 12 2013 Ville Skyttä <ville.skytta@iki.fi> -
- Fix paths to changelog and license when doc dir is unversioned (#994036).
- Fix source URL, use xz compressed tarball.
* Wed Oct 9 2013 Paul Wouters <pwouters@redhat.com> -
- Upgrade to (Various security issues)
* Sun Aug 4 2013 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> -
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild

[ 1 ] Bug #1130865 - CVE-2014-5273 phpMyAdmin: multiple cross-site scripting
issues (PMASA-2014-8)
[ 2 ] Bug #1130866 - CVE-2014-5274 phpMyAdmin: cross-site scripting flaw on
view operations page (PMASA-2014-9)

This update can be installed with the "yum" update program. Use
su -c 'yum update phpMyAdmin' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten