Package: phpmyadmin / 4:4.2.12-2+deb8u2
Metadata
| Package | Version | Patches format |
|---|---|---|
| phpmyadmin | 4:4.2.12-2+deb8u2 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| debian.patch | (download) |
libraries/vendor_config.php |
16 8 + 8 - 0 ! |
adjust phpmyadmin vendor configuration to match debian needs - setup generates configuration in /var - documentation is in /usr/share/doc - config file consists of several included files, so we skip mtime check |
| doc.patch | (download) |
doc/setup.rst |
22 5 + 17 - 0 ! |
adjust phpmyadmin documentation to match our changes Document how to enable setup script. |
| setup message.patch | (download) |
setup/frames/index.inc.php |
4 1 + 3 - 0 ! |
adjust phpmyadmin setup message to match our changes |
| bug 4611 security DOS attack with long passwords.patch | (download) |
libraries/common.inc.php |
5 5 + 0 - 0 ! |
[patch 1/1] bug #4611 [security] dos attack with long passwords Signed-off-by: Madhura Jayaratne <madhura.cj@gmail.com> |
| bug 4612 security XSS vulnerability in redirection m.patch | (download) |
url.php |
6 5 + 1 - 0 ! |
[patch 1/1] bug #4612 [security] xss vulnerability in redirection mechanism Signed-off-by: Madhura Jayaratne <madhura.cj@gmail.com> |
| CVE 2015 2206.patch | (download) |
libraries/select_lang.lib.php |
28 4 + 24 - 0 ! |
--- |
| CVE 2015 3902.patch | (download) |
libraries/url_generating.lib.php |
1 1 + 0 - 0 ! |
--- |
| CVE 2015 3903.patch | (download) |
libraries/Config.class.php |
2 0 + 2 - 0 ! |
--- |
| CVE 2015 6830.patch | (download) |
libraries/plugins/auth/AuthenticationCookie.class.php |
29 1 + 28 - 0 ! |
--- |
| CVE 2015 7873.patch | (download) |
url.php |
3 2 + 1 - 0 ! |
--- |
| CVE 2016 1927.patch | (download) |
js/functions.js |
21 19 + 2 - 0 ! |
[patch] use secure rng if available MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Recent browsers come with better RNG, so let's use it for generating password instead of Math.random if available. Signed-off-by: Michal iha <michal@cihar.com> |
| CVE 2016 2039.patch | (download) |
libraries/phpseclib/Crypt/Random.php |
230 230 + 0 - 0 ! |
[patch] use phpseclib's crypt::random to generate csrf token MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Michal iha <michal@cihar.com> |
| CVE 2016 2040.patch | (download) |
libraries/DbSearch.class.php |
3 2 + 1 - 0 ! |
--- |
| CVE 2016 2041.patch | (download) |
libraries/common.inc.php |
2 1 + 1 - 0 ! |
--- |
| CVE 2016 2560.patch | (download) |
file_echo.php |
8 6 + 2 - 0 ! |
[patch] fix xss in zoom search Signed-off-by: Madhura Jayaratne <madhura.cj@gmail.com> |
| CVE 2016 2561.patch | (download) |
libraries/structure.lib.php |
15 8 + 7 - 0 ! |
[patch] fix xss in database structure page Signed-off-by: Madhura Jayaratne <madhura.cj@gmail.com> |
| CVE 2016 5099.patch | (download) |
libraries/DisplayResults.class.php |
2 1 + 1 - 0 ! |
--- |
| CVE 2016 5701.patch | (download) |
setup/frames/index.inc.php |
27 12 + 15 - 0 ! |
[patch] use javascript for redirection to https MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The current approach is broken since whitelisting is active in url.php and also allows potential bbcode injection. Signed-off-by: Michal iha <michal@cihar.com> |
| CVE 2016 5705.patch | (download) |
libraries/DBQbe.class.php |
2 1 + 1 - 0 ! |
--- |
| CVE 2016 5706.patch | (download) |
js/get_scripts.js.php |
3 2 + 1 - 0 ! |
--- |
| CVE 2016 5731.patch | (download) |
examples/openid.php |
6 3 + 3 - 0 ! |
--- |
| CVE 2016 5733.patch | (download) |
js/ajax.js |
4 2 + 2 - 0 ! |
--- |
| CVE 2016 5739.patch | (download) |
libraries/Header.class.php |
4 4 + 0 - 0 ! |
--- |
