Summary: | [maintainer] databases/phpmyadmin security update to 2.11.9.1 | ||||||
---|---|---|---|---|---|---|---|
Product: | Ports & Packages | Reporter: | Matthew Seaman <m.seaman> | ||||
Component: | Individual Port(s) | Assignee: | Martin Wilke <miwi> | ||||
Status: | Closed FIXED | ||||||
Severity: | Affects Only Me | CC: | secteam | ||||
Priority: | Normal | ||||||
Version: | Latest | ||||||
Hardware: | Any | ||||||
OS: | Any | ||||||
Attachments: |
|
Description
Matthew Seaman
2008-09-16 06:50:01 UTC
Responsible Changed From-To: freebsd-ports-bugs->miwi I'll take it. miwi 2008-09-17 09:28:53 UTC FreeBSD ports repository Modified files: databases/phpmyadmin Makefile distinfo Log: - Update to 2.11.9.1 Security Update: A point release to close a code execution vulnerability. This bug allows a remote user logged in to the phpmyadmin web application to run arbitrary shell commands with the credentials of the web server. PR: 127417 Submitted by: Matthew Seaman <m.seaman@infracaninophile.co.uk> (maintainer) Approved by: portmgr (pav) Security: http://www.vuxml.org/freebsd/74bf1594-8493-11dd-bb64-0030843d3802.html Revision Changes Path 1.92 +1 -1 ports/databases/phpmyadmin/Makefile 1.75 +3 -3 ports/databases/phpmyadmin/distinfo _______________________________________________ cvs-all@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/cvs-all To unsubscribe, send any mail to "cvs-all-unsubscribe@freebsd.org" State Changed From-To: open->closed Committed. Thanks! |