Bug 154695 - Update databases/phpmyadmin to 3.3.9.2
Summary: Update databases/phpmyadmin to 3.3.9.2
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Doug Barton
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2011-02-11 20:10 UTC by Doug Barton
Modified: 2011-02-11 20:50 UTC (History)
0 users

See Also:


Attachments
file.diff (1.12 KB, patch)
2011-02-11 20:10 UTC, Doug Barton
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Doug Barton freebsd_committer freebsd_triage 2011-02-11 20:10:09 UTC
	3.3.9.2 is a security release to fix the following problem:
	http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php

	Announcement-ID: PMASA-2011-2
	Date: 2011-02-11

	Summary
	SQL query could be executed under another user.

	Description
	It was possible to create a bookmark which would be executed
	unintentionally by other users.

	Severity
	We consider this vulnerability to be critical.

Fix: Apply the following patch:
How-To-Repeat: 	DNA
Comment 1 Edwin Groothuis freebsd_committer freebsd_triage 2011-02-11 20:10:15 UTC
Responsible Changed
From-To: freebsd-ports-bugs->dougb

Submitter has GNATS access (via the GNATS Auto Assign Tool)
Comment 2 Edwin Groothuis freebsd_committer freebsd_triage 2011-02-11 20:10:18 UTC
Maintainer of databases/phpmyadmin,

Please note that PR ports/154695 has just been submitted.

If it contains a patch for an upgrade, an enhancement or a bug fix
you agree on, reply to this email stating that you approve the patch
and a committer will take care of it.

The full text of the PR can be found at:
    http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/154695

-- 
Edwin Groothuis via the GNATS Auto Assign Tool
edwin@FreeBSD.org
Comment 3 Edwin Groothuis freebsd_committer freebsd_triage 2011-02-11 20:10:20 UTC
State Changed
From-To: open->feedback

Awaiting maintainers feedback (via the GNATS Auto Assign Tool)
Comment 4 Matthew Seaman 2011-02-11 20:31:35 UTC
On 11/02/2011 20:10, Edwin Groothuis wrote:
> Maintainer of databases/phpmyadmin,
> 
> Please note that PR ports/154695 has just been submitted.
> 
> If it contains a patch for an upgrade, an enhancement or a bug fix
> you agree on, reply to this email stating that you approve the patch
> and a committer will take care of it.
> 
> The full text of the PR can be found at:
>     http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/154695
> 


Maintainer approves

	Cheers,

	Matthew

-- 
Dr Matthew J Seaman MA, D.Phil.                   7 Priory Courtyard
                                                  Flat 3
PGP: http://www.infracaninophile.co.uk/pgpkey     Ramsgate
JID: matthew@infracaninophile.co.uk               Kent, CT11 9PW
Comment 5 dfilter service freebsd_committer freebsd_triage 2011-02-11 20:44:16 UTC
dougb       2011-02-11 20:44:11 UTC

  FreeBSD ports repository

  Modified files:
    databases/phpmyadmin Makefile distinfo 
  Log:
  Update to 3.3.9.2, a security release to fix the following:
  http://www.phpmyadmin.net/home_page/security/PMASA-2011-2.php
  
  Announcement-ID: PMASA-2011-2
  Date: 2011-02-11
  
  Summary
  SQL query could be executed under another user.
  
  Description
  It was possible to create a bookmark which would be executed
  unintentionally by other users.
  
  Severity
  We consider this vulnerability to be critical.
  
  PR:             ports/154695
  Submitted by:   me
  Approved by:    maintainer
  
  Revision  Changes    Path
  1.131     +1 -1      ports/databases/phpmyadmin/Makefile
  1.109     +2 -2      ports/databases/phpmyadmin/distinfo
_______________________________________________
cvs-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/cvs-all
To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org"
Comment 6 Doug Barton freebsd_committer freebsd_triage 2011-02-11 20:46:28 UTC
State Changed
From-To: feedback->closed


Committed! Thanks for being so responsive. :) 


Doug