Hello community,

here is the log from the commit of package patchinfo.3228 for 
openSUSE:12.3:Update checked in at 2014-12-05 09:28:02
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.3:Update/patchinfo.3228 (Old)
 and      /work/SRC/openSUSE:12.3:Update/.patchinfo.3228.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.3228"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="3228">
  <issue id="906487" tracker="bnc">VUL-0: CVE-2014-8960: phpMyAdmin:   XSS 
vulnerability in error reporting functionality.</issue>
  <issue id="906486" tracker="bnc">VUL-0: CVE-2014-8959: phpMyAdmin:  Local 
file inclusion vulnerability.</issue>
  <issue id="906485" tracker="bnc">VUL-0: CVE-2014-8958: phpMyAdmin:  Multiple 
XSS vulnerabilities..</issue>
  <issue id="906488" tracker="bnc">VUL-0: CVE-2014-8961: phpMyAdmin:   Leakage 
of line count of an arbitrary file</issue>
  <issue id="CVE-2014-8961" tracker="cve" />
  <issue id="CVE-2014-8960" tracker="cve" />
  <issue id="CVE-2014-8958" tracker="cve" />
  <issue id="CVE-2014-8959" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>AndreasStieger</packager>
  <description>phpMyAdmin was updated to fix four security issues.

For openSUSE 12.3 and 13.1, phpMyAdmin was updated to 4.1.14.7.
For openSUSE 13.2, phpMyAdmin was updated to to 4.2.12.

These security issues were fixed:
- XSS vulnerability in error reporting functionality (CVE-2014-8960).
- Local file inclusion vulnerability (CVE-2014-8959).
- Multiple XSS vulnerabilities (CVE-2014-8958).
- Leakage of line count of an arbitrary file (CVE-2014-8961).
</description>
  <summary>Security update for phpMyAdmin</summary>
</patchinfo>
-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to